Patents by Inventor Nimrod Stoler

Nimrod Stoler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11954217
    Abstract: Disclosed embodiments relate to systems and methods for securely provisioning sensitive data elements to virtualized execution instances. The techniques may include: identifying a request to provision a new virtualized execution instance; determining, in association with the request, that the new virtualized execution instance will require a prohibited data element in order to communicate with a target network resource; without providing the new virtualized execution instance the prohibited data element, registering the new virtualized execution instance; identifying a request from the new virtualized execution instance to communicate with the target network resource: performing a verification process for the request to communicate with the target network resource; and conditional on the verification process, provisioning the prohibited data element to the new virtualized execution instance.
    Type: Grant
    Filed: November 17, 2020
    Date of Patent: April 9, 2024
    Assignee: CyberArk Software Ltd.
    Inventors: Nimrod Stoler, Lavi Lazarovitz
  • Patent number: 11947693
    Abstract: Disclosed embodiments relate to systems and methods for securely provisioning sensitive data elements to virtualized execution instances. The techniques may include: identifying a request to provision a new virtualized execution instance; determining, in association with the request, that the new virtualized execution instance will require a prohibited data element in order to communicate with a target network resource; without providing the new virtualized execution instance the prohibited data element, registering the new virtualized execution instance; identifying a request from the new virtualized execution instance to communicate with the target network resource; performing a verification process for the request to communicate with the target network resource; and conditional on the verification process, provisioning the prohibited data element to the new virtualized execution instance.
    Type: Grant
    Filed: November 17, 2020
    Date of Patent: April 2, 2024
    Assignee: CyberArk Software Ltd.
    Inventors: Nimrod Stoler, Lavi Lazarovitz
  • Publication number: 20220188444
    Abstract: Systems, methods, and non-transitory computer-readable media for container management are disclosed. A system consistent with disclosed embodiments can include a processor and a computer-readable medium containing instructions. When executed by the processor, the instructions can cause the system to perform operations. The operations can include obtaining a request by a first process running in a container for access to a protected resource. The operations can further include determining that a set of registered processes does not include the first process, the set of registered processes being processes running in the container at a time point or in a time interval following creation of the container. The operations can further include determining that an exception applies to the first process and, in response to the determination that the exception applies to the first process, providing the first process access to the protected resource.
    Type: Application
    Filed: December 20, 2021
    Publication date: June 16, 2022
    Applicant: CyberArk Software Ltd.
    Inventors: Nimrod STOLER, Lavi LAZAROVITZ
  • Patent number: 11222123
    Abstract: Disclosed embodiments relate to systems and methods for identifying vulnerabilities for virtualized execution instances to escape their operating environment and threaten a host environment. Techniques include identifying a virtualized execution instance configured for deployment on a host in a virtual computing environment; performing a privileged configuration inspection for the virtualized execution instance, the privileged configuration inspection analyzing whether the virtualized execution instance has been configured with one or more attributes that can permit operation of the virtualized execution instance to perform operations, beyond an environment of the virtualized execution instance, on an environment of the host; and implementing, based on the privileged configuration inspection, a control action for controlling the virtualized execution instance's ability to perform operations on the environment of the host.
    Type: Grant
    Filed: April 22, 2019
    Date of Patent: January 11, 2022
    Assignee: CyberArk Software Ltd.
    Inventors: Nimrod Stoler, Lavi Lazarovitz
  • Publication number: 20210073405
    Abstract: Disclosed embodiments relate to systems and methods for securely provisioning sensitive data elements to virtualized execution instances. The techniques may include: identifying a request to provision a new virtualized execution instance; determining, in association with the request, that the new virtualized execution instance will require a prohibited data element in order to communicate with a target network resource; without providing the new virtualized execution instance the prohibited data element, registering the new virtualized execution instance; identifying a request from the new virtualized execution instance to communicate with the target network resource; performing a verification process for the request to communicate with the target network resource; and conditional on the verification process, provisioning the prohibited data element to the new virtualized execution instance.
    Type: Application
    Filed: November 17, 2020
    Publication date: March 11, 2021
    Applicant: CyberArk Software Ltd.
    Inventors: Nimrod Stoler, Lavi Lazarovitz
  • Publication number: 20210073406
    Abstract: Disclosed embodiments relate to systems and methods for securely provisioning sensitive data elements to virtualized execution instances. The techniques may include: identifying a request to provision a new virtualized execution instance; determining, in association with the request, that the new virtualized execution instance will require a prohibited data element in order to communicate with a target network resource; without providing the new virtualized execution instance the prohibited data element, registering the new virtualized execution instance; identifying a request from the new virtualized execution instance to communicate with the target network resource: performing a verification process for the request to communicate with the target network resource; and conditional on the verification process, provisioning the prohibited data element to the new virtualized execution instance.
    Type: Application
    Filed: November 17, 2020
    Publication date: March 11, 2021
    Applicant: CyberArk Software Ltd.
    Inventors: Nimrod Stoler, Lavi Lazarovitz
  • Patent number: 10878119
    Abstract: Disclosed embodiments relate to systems and methods for securely provisioning sensitive data elements to virtualized execution instances. The techniques may include: identifying a request to provision a new virtualized execution instance; determining, in association with the request, that the new virtualized execution instance will require a prohibited data element in order to communicate with a target network resource; without providing the new virtualized execution instance the prohibited data element, registering the new virtualized execution instance; identifying a request from the new virtualized execution instance to communicate with the target network resource; performing a verification process for the request to communicate with the target network resource; and conditional on the verification process, provisioning the prohibited data element to the new virtualized execution instance.
    Type: Grant
    Filed: April 1, 2020
    Date of Patent: December 29, 2020
    Assignee: CYBERARK SOFTWARE LTD.
    Inventors: Nimrod Stoler, Lavi Lazarovitz
  • Publication number: 20200334371
    Abstract: Disclosed embodiments relate to systems and methods for securely provisioning sensitive data elements to virtualized execution instances. The techniques may include: identifying a request to provision a new virtualized execution instance; determining, in association with the request, that the new virtualized execution instance will require a prohibited data element in order to communicate with a target network resource; without providing the new virtualized execution instance the prohibited data element, registering the new virtualized execution instance; identifying a request from the new virtualized execution instance to communicate with the target network resource; performing a verification process for the request to communicate with the target network resource; and conditional on the verification process, provisioning the prohibited data element to the new virtualized execution instance.
    Type: Application
    Filed: April 1, 2020
    Publication date: October 22, 2020
    Applicant: CyberArk Software Ltd.
    Inventors: Nimrod Stoler, Lavi Lazarovitz
  • Publication number: 20200334362
    Abstract: Disclosed embodiments relate to systems and methods for identifying vulnerabilities for virtualized execution instances to escape their operating environment and threaten a host environment. Techniques include identifying a virtualized execution instance configured for deployment on a host in a virtual computing environment; performing a privileged configuration inspection for the virtualized execution instance, the privileged configuration inspection analyzing whether the virtualized execution instance has been configured with one or more attributes that can permit operation of the virtualized execution instance to perform operations, beyond an environment of the virtualized execution instance, on an environment of the host; and implementing, based on the privileged configuration inspection, a control action for controlling the virtualized execution instance's ability to perform operations on the environment of the host.
    Type: Application
    Filed: April 22, 2019
    Publication date: October 22, 2020
    Applicant: CyberArk Software Ltd.
    Inventors: Nimrod Stoler, Lavi Lazarovitz
  • Patent number: 10747875
    Abstract: Disclosed embodiments relate to secure and reliable customization of operating system kernels. Techniques include configuring a kernel security module for loading to an operating system kernel to run kernel-level scripts on the kernel, the kernel security module being configured to perform a security verification comprising operations of: identifying, at the kernel security module, a script received at the kernel security module for requested execution by the kernel, and verifying whether the script has a valid signature; determining, at the kernel security module and based on the security verification, whether to permit the script to be processed by the kernel; and identifying, based on the determining, executable code corresponding to the script to execute at the kernel.
    Type: Grant
    Filed: March 19, 2020
    Date of Patent: August 18, 2020
    Assignee: CyberArk Software Ltd.
    Inventor: Nimrod Stoler
  • Patent number: 10735430
    Abstract: Disclosed embodiments relate to systems and methods for dynamically analyzing and enrolling virtualized execution instances. Techniques include identifying a request for enrollment for a virtualized execution instance configured to be deployed on a host in a virtual computing environment, the request including a result of a privileged configuration inspection for the virtualized execution instance; determining, based on the result of the privileged configuration inspection, to automatically enroll the virtualized execution instance; and including the virtualized execution instance in a group of enrolled virtualized execution instances, the group being available for secure communications with one or more clients in a manner that is isolated from the host.
    Type: Grant
    Filed: June 25, 2019
    Date of Patent: August 4, 2020
    Assignee: CyberArk Software Ltd.
    Inventor: Nimrod Stoler
  • Patent number: 10623446
    Abstract: Disclosed embodiments relate to systems and methods for implementing secure and multi-factor authentication for computing resources. Techniques include accessing at least one portion of identity data for a computing resource; providing the at least one portion of the identity data to the computing resource; identifying network address information unique to the computing resource; identifying a request, from the computing resource, to perform an action requiring an access token; provisioning the network address information unique to the computing resource, for use in transmitting the access token to the computing resource; and verifying both the at least one portion of the identity data and the network address information unique to the computing resource.
    Type: Grant
    Filed: September 9, 2019
    Date of Patent: April 14, 2020
    Assignee: CYBERARK SOFTWARE LTD.
    Inventor: Nimrod Stoler