Patents by Inventor Ohad Plotnik

Ohad Plotnik has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11706650
    Abstract: Method for orchestrating wireless sensors, including registering each of a plurality of monitoring sensors that are attached to a respective plurality of wireless hosting equipment, with an orchestrator, generating, for each sensor, a monitoring plan including a description of wireless channels/protocols for the sensor to monitor, and amounts of time that the sensor should spend monitoring each channel/protocol prior to advancing to a next channel/protocol, wherein the monitoring plan for a sensor includes directives that instruct the sensor what to do when a monitoring period for a channel/protocol is interrupted before its intended monitoring time is finished, attempting, by the sensors, to monitor the channels/protocols specified in the sensor's monitoring plan in accordance with the time specified in the sensor's monitoring plan, and generating, by each sensor, an execution report including time spent at each channel/protocol, amount of data collected from each channel/protocol, and data captured from eac
    Type: Grant
    Filed: March 8, 2022
    Date of Patent: July 18, 2023
    Assignee: AirEye Ltd
    Inventors: Amichai Shulman, Shlomo Touboul, Ohad Plotnik, Roi Keren
  • Publication number: 20220400380
    Abstract: A wireless security method performed by a network monitoring system for a wireless station, the method maintaining continuous wireless service, the method including identifying a desired network, to which the wireless station is currently connected vis a legitimate access point, as having become an undesirable network, based on a network security policy, and based on network variables, activate the legitimate access point to create a desired network, comprising changing network variables of the undesired network, and maintaining the wireless station connection to the network, based on the security policy.
    Type: Application
    Filed: June 14, 2022
    Publication date: December 15, 2022
    Inventors: Roi Keren, Ohad Plotnik, Amichai Shulman, Shlomo Touboul
  • Publication number: 20220303803
    Abstract: Method for orchestrating wireless sensors, including registering each of a plurality of monitoring sensors that are attached to a respective plurality of wireless hosting equipment, with an orchestrator, generating, for each sensor, a monitoring plan including a description of wireless channels/protocols for the sensor to monitor, and amounts of time that the sensor should spend monitoring each channel/protocol prior to advancing to a next channel/protocol, wherein the monitoring plan for a sensor includes directives that instruct the sensor what to do when a monitoring period for a channel/protocol is interrupted before its intended monitoring time is finished, attempting, by the sensors, to monitor the channels/protocols specified in the sensor's monitoring plan in accordance with the time specified in the sensor's monitoring plan, and generating, by each sensor, an execution report including time spent at each channel/protocol, amount of data collected from each channel/protocol, and data captured from eac
    Type: Application
    Filed: March 8, 2022
    Publication date: September 22, 2022
    Inventors: Amichai Shulman, Shlomo Touboul, Ohad Plotnik, Roi Keren
  • Patent number: 11297518
    Abstract: Orchestrating wireless monitoring sensors, including registering each sensor with an orchestrator, generating, by the orchestrator for each sensor, a monitoring plan including a description of wireless channels and protocols for the sensor to monitor, and amounts of time that the sensor should spend monitoring each channel/protocol, attempting, by each of the sensors, to monitor the channels/protocols specified in the sensor's monitoring plan in accordance with the amounts of time specified in the monitoring plan, generating, by each sensor, an execution report including, for each channel/protocol monitored by the sensor, the actual time spent at the channel/protocol, the actual amount of data collected from the channel/protocol, and data captured from the channel/protocol, generating, by the orchestrator, a current coverage map indicating coverage of each channel over space and time, and further generating, by the orchestrator, one or more respective updated monitoring plans, based on the current coverage ma
    Type: Grant
    Filed: July 26, 2021
    Date of Patent: April 5, 2022
    Assignee: AirEye Ltd.
    Inventors: Amichai Shulman, Shlomo Touboul, Ohad Plotnik, Roi Keren
  • Patent number: 9729538
    Abstract: A method, system and computer program for recoupling Kerberos Authentication and Authorization requests, the method including the steps of: (a) extracting authorization information, including a copy of a Ticket Granting Ticket (TGT), from an authorization request; (b) retrieving authentication information including the TGT, the authentication information having been previously extracted from an authentication transaction and stored; (c) cross-referencing the extracted authorization information with the retrieved authentication information, such that a discrepancy between the cross-referenced information invokes a security event alert.
    Type: Grant
    Filed: September 1, 2014
    Date of Patent: August 8, 2017
    Assignee: Microsoft Israel Research and Development (2002) Ltd
    Inventors: Idan Plotnik, Tal Arieh Be'ery, Michael Dolinsky, Ohad Plotnik, Gregory Messerman, Sivan Krigsman
  • Publication number: 20160065565
    Abstract: A method, system and computer program for recoupling Kerberos Authentication and Authorization requests, the method including the steps of (a) extracting authorization information, including a copy of a Ticket Granting Ticket (TGT), from an authorization request; (b) retrieving authentication information including the TOT, the authentication information having been previously extracted from an authentication transaction and stored; (c) cross-referencing the extracted authorization information with the retrieved authentication information, such that a discrepancy between the cross-referenced information invokes a security event alert.
    Type: Application
    Filed: September 1, 2014
    Publication date: March 3, 2016
    Applicant: Aorato Ltd
    Inventors: Idan PLOTNIK, Tal Arieh Be'ery, Michael Dolinsky, Ohad Plotnik, Gregory Messerman, Sivan Krigsman
  • Publication number: 20160014077
    Abstract: A method system and computer program product for protecting Directory Services (DS) by monitoring traffic to the DS; deciding to block a client access request in the monitored traffic originating from a network client; synthesizing an error message based at least in part on the client access request; and sending the synthesized error message to the network client, causing the network client to abort access request process such as an authentication process or an authorization process.
    Type: Application
    Filed: July 10, 2014
    Publication date: January 14, 2016
    Applicant: Aorato Ltd.
    Inventors: Idan PLOTNIK, Tal Arieh BE'ERY, Michael DOLINSKY, Ohad PLOTNIK
  • Patent number: 8548998
    Abstract: A system and method for protecting a networked organizational data storage facility, which is accessible by a network environment, by mapping the network environment, profiling the network environment and filtering the network traffic based on said profiling of the network environment.
    Type: Grant
    Filed: January 13, 2010
    Date of Patent: October 1, 2013
    Assignee: Aorato Ltd.
    Inventors: Idan Plotnik, Itay Podhajcer, Ohad Plotnik
  • Publication number: 20110258208
    Abstract: A system and method for protecting a networked organizational data storage facility, which is accessible by a network environment, by mapping the network environment, profiling the network environment and filtering the network traffic based on said profiling of the network environment.
    Type: Application
    Filed: January 13, 2010
    Publication date: October 20, 2011
    Inventors: Idan Plotnik, Itay Podhajcer, Ohad Plotnik