Patents by Inventor Ofer Rivlin
Ofer Rivlin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11757626Abstract: Disclosed embodiments relate to systems and methods for deterministic cryptography deidentification enabling granular destruction. Techniques include preparing a table of name-token pair groupings with unique tokens, storing data deidentified in association with the deidentification process in a centralized repository, identifying a token from the table of name-token pair groupings, and enabling reidentifying of a specific data item of the deidentified data based on the token provided from the table.Type: GrantFiled: February 17, 2022Date of Patent: September 12, 2023Assignee: CYBERARK SOFTWARE LTD.Inventor: Ofer Rivlin
-
Publication number: 20230261856Abstract: Disclosed embodiments relate to systems and methods for deterministic cryptography deidentification enabling granular destruction. Techniques include preparing a table of name-token pair groupings with unique tokens, storing data deidentified in association with the deidentification process in a centralized repository, identifying a token from the table of name-token pair groupings, and enabling reidentifying of a specific data item of the deidentified data based on the token provided from the table.Type: ApplicationFiled: February 17, 2022Publication date: August 17, 2023Applicant: CyberArk Software Ltd.Inventor: Ofer Rivlin
-
Patent number: 11689546Abstract: Disclosed embodiments relate to improving network security through real-time analysis of character similarities. Techniques include identifying a reference name, identifying a domain name, and performing a real-time analysis of the domain name. The real-time analysis may include applying a language processing protocol to the domain name, generating a score indicating a similarity between the domain name and the reference name, accessing a similarity threshold, and comparing the generated score with the similarity threshold. Further techniques include determining that the score exceeds the threshold and performing a security action.Type: GrantFiled: September 28, 2021Date of Patent: June 27, 2023Assignee: CYBERARK SOFTWARE LTD.Inventor: Ofer Rivlin
-
Publication number: 20230098812Abstract: Disclosed embodiments relate to improving network security through real-time analysis of character similarities. Techniques include identifying a reference name, identifying a domain name, and performing a real-time analysis of the domain name. The real-time analysis may include applying a language processing protocol to the domain name, generating a score indicating a similarity between the domain name and the reference name, accessing a similarity threshold, and comparing the generated score with the similarity threshold. Further techniques include determining that the score exceeds the threshold and performing a security action.Type: ApplicationFiled: September 28, 2021Publication date: March 30, 2023Applicant: CyberArk Software Ltd.Inventor: OFER RIVLIN
-
Patent number: 11238168Abstract: Disclosed embodiments relate to performing secure and flexible searches of encrypted data. Operations may include maintaining a database of a plurality of sets of encrypted data; receiving a transformed search query for the database, the transformed search query having undergone a transformation process at a client including: identifying a plaintext string in a search query at the client, applying the plaintext string to a language dictionary accessible to the client, receiving, based on the language dictionary, one or more plaintext search strings, and encrypting, at the client, the one or more plaintext search strings; and returning a result based on the transformed search query, the result being based on the encrypted one or more plaintext search strings.Type: GrantFiled: April 20, 2020Date of Patent: February 1, 2022Assignee: CyberArk Software Ltd.Inventor: Ofer Rivlin
-
Publication number: 20210326456Abstract: Disclosed embodiments relate to performing secure and flexible searches of encrypted data. Operations may include maintaining a database of a plurality of sets of encrypted data; receiving a transformed search query for the database, the transformed search query having undergone a transformation process at a client including: identifying a plaintext string in a search query at the client, applying the plaintext string to a language dictionary accessible to the client, receiving, based on the language dictionary, one or more plaintext search strings, and encrypting, at the client, the one or more plaintext search strings; and returning a result based on the transformed search query, the result being based on the encrypted one or more plaintext search strings.Type: ApplicationFiled: April 20, 2020Publication date: October 21, 2021Inventor: Ofer Rivlin
-
Patent number: 11012245Abstract: Disclosed embodiments relate to securely facilitating decentralized management of identity data. Operations may include receiving, from an identity, encrypted data and an index associated with the encrypted data; receiving, from the identity, a first request including: the index, a first part of a first cryptographic key, and a target service cryptographic key; identifying, using the index, the encrypted data; encrypting a copy of the encrypted data using the target service cryptographic key to form a doubly encrypted data; sending a challenge token to the identity; receiving a second request, from a target service, the second request including: the index and a challenge response created based on the challenge token; and sending to the target service the doubly encrypted data and the first part of the first cryptographic key; wherein the target service is operable to decrypt the doubly encrypted data.Type: GrantFiled: September 10, 2020Date of Patent: May 18, 2021Assignee: CYBERARK SOFTWARE LTD.Inventor: Ofer Rivlin
-
Patent number: 10997301Abstract: Disclosed embodiments relate to dynamically changing an encryption technique for encrypted data to be stored in a searchable database. Operations may include receiving encrypted data for storage in the searchable database, the encrypted data having been encrypted by a client using a cryptographic key based on an encryption alteration scheme; receiving a search query from the client, the search query comprising a plurality of search strings including at least: an encrypted version of a plaintext string that was encrypted by the client using the cryptographic key, and one or more encrypted versions of the plaintext string that were encrypted by the client using one or more other cryptographic keys; processing the search query; and returning a response to the search query to the client.Type: GrantFiled: April 20, 2020Date of Patent: May 4, 2021Assignee: CYBERARK SOFTWARE LTD.Inventor: Ofer Rivlin
-
Patent number: 10931454Abstract: Disclosed embodiments relate to securely facilitating decentralized management of identity data. Operations may include identifying a prompt to perform an attestation process for an identity; receiving, from the identity, a first request including: an index associated with encrypted data, a second part of a first cryptographic key, and a challenge token; generating a challenge response based on the challenge token; sending a second request to a data management hub including: the index and the challenge response; receiving a response to the second request, from the data management hub, the response including: doubly encrypted data formed by encrypting a copy of the encrypted data and a first part of the first cryptographic key; and decrypting the doubly encrypted data.Type: GrantFiled: September 10, 2020Date of Patent: February 23, 2021Assignee: CYBERARK SOFTWARE LTD.Inventor: Ofer Rivlin
-
Patent number: 10885217Abstract: Disclosed embodiments relate to implementing, as a microservice at a client, a searchable-encryption service. Operations may include executing the microservice at the client to perform operations including: encrypting data based on a cryptographic key accessible to the client; sending the encrypted data to a network storage resource; identifying, at the microservice, a search query in plaintext; encrypting the search query according to the cryptographic key; sending the encrypted search query to the network storage resource; and receiving a response to the encrypted search query from the network storage resource.Type: GrantFiled: April 20, 2020Date of Patent: January 5, 2021Assignee: CYBERARK SOFTWARE LTD.Inventor: Ofer Rivlin
-
Patent number: 10454955Abstract: A configuration is received for an agent associated with an application to monitor application transactions. The agent monitors incoming and outgoing application transactions using the agent and transmits monitored transaction data to a monitoring server for anomalous transaction detection. The agent receives instructions from the monitoring server to perform an action based on the transmitted monitored transaction data and reports the status of the performed action to the monitoring server.Type: GrantFiled: June 18, 2018Date of Patent: October 22, 2019Assignee: SAP SEInventors: Elad Schulman, Amidan Tabak, Ofer Rivlin
-
Patent number: 10419452Abstract: An SSH module is executed as part of a host computing machine, where code for an secure shell (SSH) agent is integrated with code of the SSH module. Incoming and outgoing host computing machine transactions are collected using the SSH agent which transmits the collected host computing machine transactions to an SSH context agent external to the SSH module. The collected host machine transactions are transmitted to a monitoring server for anomalous transaction detection. The monitoring server returns instructions to perform an action based on an anomalous transaction detection.Type: GrantFiled: December 28, 2015Date of Patent: September 17, 2019Assignee: SAP SEInventors: Elad Schulman, Amidan Tabak, Ofer Rivlin
-
Publication number: 20180302421Abstract: A configuration is received for an agent associated with an application to monitor application transactions. The agent monitors incoming and outgoing application transactions using the agent and transmits monitored transaction data to a monitoring server for anomalous transaction detection. The agent receives instructions from the monitoring server to perform an action based on the transmitted monitored transaction data and reports the status of the performed action to the monitoring server.Type: ApplicationFiled: June 18, 2018Publication date: October 18, 2018Inventors: Elad Schulman, Amidan Tabak, Ofer Rivlin
-
Patent number: 10015178Abstract: A configuration is received for an agent associated with an application to monitor application transactions. The agent monitors incoming and outgoing application transactions using the agent and transmits monitored transaction data to a monitoring server for anomalous transaction detection. The agent receives instructions from the monitoring server to perform an action based on the transmitted monitored transaction data and reports the status of the performed action to the monitoring server.Type: GrantFiled: December 28, 2015Date of Patent: July 3, 2018Assignee: SAP SEInventors: Elad Schulman, Amidan Tabak, Ofer Rivlin
-
Publication number: 20170034193Abstract: A configuration is received for an agent associated with an application to monitor application transactions. The agent monitors incoming and outgoing application transactions using the agent and transmits monitored transaction data to a monitoring server for anomalous transaction detection. The agent receives instructions from the monitoring server to perform an action based on the transmitted monitored transaction data and reports the status of the performed action to the monitoring server.Type: ApplicationFiled: December 28, 2015Publication date: February 2, 2017Inventors: Elad Schulman, Amidan Tabak, Ofer Rivlin
-
Publication number: 20170034192Abstract: An SSH module is executed as part of a host computing machine, where code for an secure shell (SSH) agent is integrated with code of the SSH module. Incoming and outgoing host computing machine transactions are collected using the SSH agent which transmits the collected host computing machine transactions to an SSH context agent external to the SSH module. The collected host machine transactions are transmitted to a monitoring server for anomalous transaction detection. The monitoring server returns instructions to perform an action based on an anomalous transaction detection.Type: ApplicationFiled: December 28, 2015Publication date: February 2, 2017Inventors: Elad Schulman, Amidan Tabak, Ofer Rivlin