Patents by Inventor Lior Drihem

Lior Drihem has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230306127
    Abstract: This disclosure describes many innovations including but not limited to systems, methods, and non-transitory computer readable media containing instructions for managing permission policies.
    Type: Application
    Filed: March 24, 2023
    Publication date: September 28, 2023
    Applicant: ORCA SECURITY LTD.
    Inventors: Avi SHUA, Itamar GOLAN, Lior DRIHEM
  • Publication number: 20230291743
    Abstract: Systems, methods, and non-transitory computer readable media including instructions for determining utilized permissions in a cloud computing environment.
    Type: Application
    Filed: March 24, 2023
    Publication date: September 14, 2023
    Applicant: ORCA SECURITY LTD.
    Inventors: Avi SHUA, Itamar GOLAN, Lior DRIHEM
  • Patent number: 11323426
    Abstract: Transparently identifying users using a shared VPN tunnel uses an innovative method to detect a user of a shared VPN tunnel, after authenticating the user, using an assigned userid (that may be a virtual IP). The virtual IP is used as a cookie in each request made by the user. This cookie is an authentication token used by the gateway to detect the user behind a specific request for an Internet resource (such as an http/s request). The cookie is stripped by the gateway so the cookie is not sent to the resource.
    Type: Grant
    Filed: October 19, 2017
    Date of Patent: May 3, 2022
    Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Amnon Perlmutter, Lior Drihem, Yair Ziv, Jeremy Sinai, Tsemach Mizrachi
  • Publication number: 20210234837
    Abstract: Detecting and preventing phishing attacks in real-time features protection of users from feeding sensitive data to phishing sites, educating users for theft awareness, and protecting enterprise credentials. A requested document traversing a gateway is embedded with a detection module. When a user accesses the document, the embedded detection module is executed in the context of the document, checks if the document is prompting the user for sensitive information, determining if the document is part of a phishing attack, and initiates mitigation, warning, and/or education techniques.
    Type: Application
    Filed: April 11, 2021
    Publication date: July 29, 2021
    Inventors: Meir Jonathan DAHAN, Lior DRIHEM, Amnon PERLMUTTER, Ofir TAM
  • Patent number: 10567468
    Abstract: Methods and systems provide mechanisms for inspection devices, such as firewalls and servers and computers associated therewith, to selectively manipulate files, for which a download has been requested. The manipulation is performed in a manner which is transparent to the requesting user.
    Type: Grant
    Filed: December 28, 2015
    Date of Patent: February 18, 2020
    Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Amnon Perlmutter, Lior Drihem
  • Publication number: 20190124059
    Abstract: Transparently identifying users using a shared VPN tunnel uses an innovative method to detect a user of a shared VPN tunnel, after authenticating the user, using an assigned userid (that may be a virtual IP). The virtual IP is used as a cookie in each request made by the user. This cookie is an authentication token used by the gateway to detect the user behind a specific request for an Internet resource (such as an http/s request). The cookie is stripped by the gateway so the cookie is not sent to the resource.
    Type: Application
    Filed: October 19, 2017
    Publication date: April 25, 2019
    Inventors: Amnon PERLMUTTER, Lior Drihem, Yair Ziv, Jeremy Sinai, Tsemach Mizrachi
  • Publication number: 20190068556
    Abstract: Cyber security protection from, and avoiding inspection bypass, in network communication connections, in particular due to DNS poisoning or HTTP HOST header spoofing includes receiving a request for a resource. Typically, the request is received by a proxy from a web browser on a client for a web page on a server. The request is communicated via transport layer security (TLS) protocol. The TLS protocol includes a server name indication (SNI) extension and the SNI extension includes a first location of the resource. A connection is initiated, by the proxy, to the first location (included in said SNI extension), ignoring a second location in the original request.
    Type: Application
    Filed: August 31, 2017
    Publication date: February 28, 2019
    Inventors: Amnon PERLMUTTER, Lior DRIHEM
  • Publication number: 20180343277
    Abstract: Actively and passively monitoring current network security threats and impact, to evaluate and maintain cyber security includes using an innovative combination of threat feed, impact assessment, client profile, security policy, and vulnerability report to determine impact of malware, evaluate and maintain security policy, decrease vulnerability, and dynamically implement solutions to prevent malware attacks. Constantly re-evaluating the customer's cyber security implementation facilitates dynamic tuning of cyber security implementation.
    Type: Application
    Filed: May 25, 2017
    Publication date: November 29, 2018
    Inventors: Lior DRIHEM, Meir Jonathan Dahan, Matan Mishan, Maya Horowitz
  • Patent number: 10057390
    Abstract: Methods and systems provide mechanisms for inspection devices, such as firewalls and servers and computers associated therewith, to modify HTTP requests, without requiring the inspection device to terminate the connections at the TCP (Transport Control Protocol) level, as occurs with contemporary web proxies, e.g., web proxy servers—either explicit or implicit proxies.
    Type: Grant
    Filed: April 1, 2015
    Date of Patent: August 21, 2018
    Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Amnon Perlmutter, Lior Drihem
  • Publication number: 20170195363
    Abstract: Detecting and preventing phishing attacks in real-time features protection of users from feeding sensitive data to phishing sites, educating users for theft awareness, and protecting enterprise credentials. A requested document traversing a gateway is embedded with a detection module. When a user accesses the document, the embedded detection module is executed in the context of the document, checks if the document is prompting the user for sensitive information, determining if the document is part of a phishing attack, and initiates mitigation, warning, and/or education techniques.
    Type: Application
    Filed: March 31, 2016
    Publication date: July 6, 2017
    Inventors: Meir Jonathan DAHAN, Lior DRIHEM, Amnon PERLMUTTER, Ofir TAM
  • Publication number: 20170195293
    Abstract: Detecting and preventing phishing attacks in real-time features protection of users from feeding sensitive data to phishing sites, educating users for theft awareness, and protecting enterprise credentials. A requested document traversing a gateway is embedded with a detection module. When a user accesses the document, the embedded detection module is executed in the context of the document, checks if the document is prompting the user for sensitive information, determining if the document is part of a phishing attack, and initiates mitigation, warning, and/or education techniques.
    Type: Application
    Filed: December 31, 2015
    Publication date: July 6, 2017
    Inventors: Meir Jonathan DAHAN, Lior DRIHEM, Amnon PERLMUTTER, Ofir TAM
  • Publication number: 20170187682
    Abstract: Methods and systems provide mechanisms for inspection devices, such as firewalls and servers and computers associated therewith, to selectively manipulate files, for which a download has been requested. The manipulation is performed in a manner which is transparent to the requesting user.
    Type: Application
    Filed: December 28, 2015
    Publication date: June 29, 2017
    Inventors: Amnon PERLMUTTER, Lior DRIHEM
  • Publication number: 20160294989
    Abstract: Methods and systems provide mechanisms for inspection devices, such as firewalls and servers and computers associated therewith, to modify HTTP requests, without requiring the inspection device to terminate the connections at the TCP (Transport Control Protocol) level, as occurs with contemporary web proxies, e.g., web proxy servers—either explicit or implicit proxies.
    Type: Application
    Filed: April 1, 2015
    Publication date: October 6, 2016
    Inventors: Amnon PERLMUTTER, Lior DRIHEM
  • Publication number: 20160191531
    Abstract: Methods and systems for blocking reception of digital content elements by devices are disclosed. These methods and systems comprise elements of hardware and software for, receiving an electronic communication including at least one digital document; determining the content type of the at least one digital document; based on the content type of the at least one digital document, modifying the digital content of the digital document so as to selectively disable functionality of the digital document; and, enabling the subsequent processing of the electronic communication including the at least one digital document with the modified digital content.
    Type: Application
    Filed: December 29, 2014
    Publication date: June 30, 2016
    Inventors: Amnon Perlmutter, Limor Ganon, Lior Drihem, Lior Tamim
  • Patent number: 9210128
    Abstract: A computer-readable storage medium has embedded thereon non-transient computer-readable code for controlling access to a protected computer network, by intercepting packets that are being exchanged between a computer system and the protected network, and then, for each intercepted packet, identifying the associated application that is running on the computer system, determining whether the application is trusted, for example according to a white list or according to a black list, and disposing of the packet accordingly.
    Type: Grant
    Filed: May 26, 2013
    Date of Patent: December 8, 2015
    Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Lior Drihem, Amnon Perlmutter
  • Publication number: 20150006881
    Abstract: A user device generates a key for encrypting and decrypting data of an application suite, uses a long secret to encrypt the key, and stores the key locally only as encrypted. The key is stored, along with a user-provided short secret, in a non-volatile memory of a server. Preferably, the key is generated only if an indication is received from the server that the long secret is identical to a reference long secret. The user obtains the key either by presenting the short secret to the server or by presenting the long secret to the user device to enable the user device to decrypt the encrypted key.
    Type: Application
    Filed: June 27, 2013
    Publication date: January 1, 2015
    Inventors: Amnon Perlmutter, Lior Drihem
  • Publication number: 20140123269
    Abstract: A computer-readable storage medium has embedded thereon non-transient computer-readable code for controlling access to a protected computer network, by intercepting packets that are being exchanged between a computer system and the protected network, and then, for each intercepted packet, identifying the associated application that is running on the computer system, determining whether the application is trusted, for example according to a white list or according to a black list, and disposing of the packet accordingly.
    Type: Application
    Filed: May 26, 2013
    Publication date: May 1, 2014
    Applicant: Check Point Software Technologies Ltd.
    Inventors: Lior Drihem, Amnon Perlmutter
  • Publication number: 20060294595
    Abstract: A method for securing a server undergoing data communication with a remote client computer in a client/server network. The method includes requesting an application by a user of the remote client computer. In response to the request, the server transmits a module which runs on the remote client computer. When run, the module collects client information regarding the client computer and based on the collected client information selects one or more security mechanisms, preferably including one encryption mechanism and runs the security mechanisms on the remote client computer.
    Type: Application
    Filed: June 27, 2005
    Publication date: December 28, 2006
    Inventor: Lior Drihem