Patents by Inventor Omer Schory

Omer Schory has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11956279
    Abstract: A method and a computer program product and an apparatus for securing communication in heterogeneous networks that include devices with different protection levels. The method comprises monitoring, by a security agent installed on a device, communication between the device and external devices. The method comprises determining a level of in-device protection for each device based on available protection thereof. The method further comprises employing, by the security agent, an associated security policy for communications originating from the device, based on the level of in-device protection; such as resources utilized for employing security policies for communications originating from devices are correlated with the protection levels thereof. The method may further comprise enabling sharing security workload between device having trusted security agents to improve performance efficiency thereof.
    Type: Grant
    Filed: June 11, 2020
    Date of Patent: April 9, 2024
    Assignee: JFROG LTD
    Inventors: Omer Schory, Or Peles, Shmuel Ur
  • Publication number: 20230362206
    Abstract: A method and a computer program product and an apparatus for securing communication in heterogeneous networks that include devices with different protection levels. The method comprises monitoring, by a security agent installed on a device, communication between the device and external devices. The method comprises determining a level of in-device protection for each device based on available protection thereof. The method further comprises employing, by the security agent, an associated security policy for communications originating from the device, based on the level of in-device protection; such as resources utilized for employing security policies for communications originating from devices are correlated with the protection levels thereof. The method may further comprise enabling sharing security workload between device having trusted security agents to improve performance efficiency thereof.
    Type: Application
    Filed: July 17, 2023
    Publication date: November 9, 2023
    Inventors: Omer Schory, Or Peles, Shmuel Ur
  • Publication number: 20230362205
    Abstract: A method and a computer program product and an apparatus for securing communication in heterogeneous networks that include devices with different protection levels. The method comprises monitoring, by a security agent installed on a device, communication between the device and external devices. The method comprises determining a level of in-device protection for each device based on available protection thereof. The method further comprises employing, by the security agent, an associated security policy for communications originating from the device, based on the level of in-device protection; such as resources utilized for employing security policies for communications originating from devices are correlated with the protection levels thereof. The method may further comprise enabling sharing security workload between device having trusted security agents to improve performance efficiency thereof.
    Type: Application
    Filed: July 17, 2023
    Publication date: November 9, 2023
    Inventors: Omer Schory, Or Peles, Shmuel Ur
  • Publication number: 20220108007
    Abstract: A method, apparatus and product including: obtaining metadata about a firmware, wherein the metadata comprises one or more constraints on execution of a system call by the firmware; during execution of the firmware, identifying a system call event, wherein the system call event comprises an invocation of the system call; determining that the system call event violates the one or more constraints on the execution of the system call; and in response to said determining that the system call event violates the one or more constraints, performing a responsive action.
    Type: Application
    Filed: October 4, 2021
    Publication date: April 7, 2022
    Inventors: Daniel Zatutschne-Marom, Omer Schory
  • Patent number: 10878106
    Abstract: A method, apparatus and product for firmware verification. The method comprises obtaining a list of libraries utilized by a firmware. The method comprises determining a set of vulnerabilities of the firmware by identifying vulnerabilities corresponding to each library of the list of libraries. The method further comprises determining a set of remedial actions for the set of vulnerabilities, the set of remedial actions including an offline remedial action and an online remedial action. The method further comprises determining for the set of vulnerabilities a combination of remedial actions based on estimated costs and estimated runtime overheads of the set of remedial actions. The method further comprises providing an output based on the combination of remedial actions.
    Type: Grant
    Filed: November 25, 2019
    Date of Patent: December 29, 2020
    Assignee: VDOO CONNECTED TRUST LTD.
    Inventors: Netanel Davidi, Uri Alter, Asaf Karas, Omer Schory
  • Publication number: 20200396259
    Abstract: A method and a computer program product and an apparatus for securing communication in heterogeneous networks that include devices with different protection levels. The method comprises monitoring, by a security agent installed on a device, communication between the device and external devices. The method comprises determining a level of in-device protection for each device based on available protection thereof. The method further comprises employing, by the security agent, an associated security policy for communications originating from the device, based on the level of in-device protection; such as resources utilized for employing security policies for communications originating from devices are correlated with the protection levels thereof. The method may further comprise enabling sharing security workload between device having trusted security agents to improve performance efficiency thereof.
    Type: Application
    Filed: June 11, 2020
    Publication date: December 17, 2020
    Inventors: Omer Schory, Or Peles, Shmuel Ur
  • Publication number: 20200089893
    Abstract: A method, apparatus and product for firmware verification. The method comprises obtaining a list of libraries utilized by a firmware. The method comprises determining a set of vulnerabilities of the firmware by identifying vulnerabilities corresponding to each library of the list of libraries. The method further comprises determining a set of remedial actions for the set of vulnerabilities, the set of remedial actions including an offline remedial action and an online remedial action. The method further comprises determining for the set of vulnerabilities a combination of remedial actions based on estimated costs and estimated runtime overheads of the set of remedial actions. The method further comprises providing an output based on the combination of remedial actions.
    Type: Application
    Filed: November 25, 2019
    Publication date: March 19, 2020
    Inventors: Netanel Davidi, Uri Alter, Asaf Karas, Omer Schory
  • Publication number: 20200042715
    Abstract: A method, apparatus and product for firmware verification. The method comprises obtaining a list of libraries utilized by a firmware. The method comprises determining a set of vulnerabilities of the firmware by identifying vulnerabilities corresponding to each library of the list of libraries. The method further comprises determining a set of remedial actions for the set of vulnerabilities, the set of remedial actions including an offline remedial action and an online remedial action. The method further comprises determining for the set of vulnerabilities a combination of remedial actions based on estimated costs and estimated runtime overheads of the set of remedial actions. The method further comprises providing an output based on the combination of remedial actions.
    Type: Application
    Filed: July 30, 2019
    Publication date: February 6, 2020
    Inventors: Netanel Davidi, Uri Alter, Asaf Karas, Omer Schory
  • Patent number: 10534918
    Abstract: A method, apparatus and product for firmware verification. The method comprises obtaining a list of libraries utilized by a firmware. The method comprises determining a set of vulnerabilities of the firmware by identifying vulnerabilities corresponding to each library of the list of libraries. The method further comprises determining a set of remedial actions for the set of vulnerabilities, the set of remedial actions including an offline remedial action and an online remedial action. The method further comprises determining for the set of vulnerabilities a combination of remedial actions based on estimated costs and estimated runtime overheads of the set of remedial actions. The method further comprises providing an output based on the combination of remedial actions.
    Type: Grant
    Filed: July 30, 2019
    Date of Patent: January 14, 2020
    Assignee: VDOO CONNECTED TRUST LTD.
    Inventors: Netanel Davidi, Uri Alter, Asaf Karas, Omer Schory
  • Patent number: 10310870
    Abstract: It is often desired to add or change the functionality of an existing executable, also known as binary. Simply splicing in new machine code into the binary will not work due to host system-specific and platform-specific limitations. The present invention will enable adding any new code to an existing program while overcoming the aforementioned consistency limitations and maintaining the original functionality.
    Type: Grant
    Filed: August 8, 2016
    Date of Patent: June 4, 2019
    Assignee: APPDOME LTD.
    Inventors: Avner Yehuda, Omer Schory, Meir Tsvi, Daniel Zatuchne
  • Publication number: 20170228540
    Abstract: Software traps per application that attract malicious software are created by mimicking the behavior of the application. In an embodiment, the software traps are comprised of mimicked entities which will be created and monitored to detect malicious code activity using an additional layer to the application.
    Type: Application
    Filed: February 9, 2016
    Publication date: August 10, 2017
    Applicant: APPDOME LTD.
    Inventors: Avner Yehuda, Omer Schory
  • Publication number: 20170201526
    Abstract: Today's methods for protecting the contents of a file enable a user to encrypt the whole file and protect its content from others. This means that for a company with employees at different categories which need to get access to certain sections in the document, multiple categories, multiple version of the document need to be generated with different encryption schemes this which will complicate the document generation, distribution and update at the corporate server The present invention will allow inclusion of encrypted sections in the file and by using the metadata layer the standard application may be instructed to ignore these sections. Hence a single document may exist with reading capabilities set per employee category and the sections always encrypted thus simplifying the document generation and distribution at the corporate server.
    Type: Application
    Filed: November 15, 2015
    Publication date: July 13, 2017
    Applicant: APPDOME LTD.
    Inventors: Avner Yehuda, Omer Schory
  • Publication number: 20170060565
    Abstract: It is often desired to add or change the functionality of an existing executable, also known as binary. Simply splicing in new machine code into the binary will not work due to host system-specific and platform-specific limitations. The present invention will enable adding any new code to an existing program while overcoming the aforementioned consistency limitations and maintaining the original functionality.
    Type: Application
    Filed: August 8, 2016
    Publication date: March 2, 2017
    Applicant: APPDOME LTD.
    Inventors: Avner Yehuda, Omer Schory, Meir Tsvi, Daniel Zatuchne
  • Patent number: 9137204
    Abstract: A system and method for protecting data communications in a system including a load-balancer connected to a cluster of security network components, e.g. firewall node. The load-balancer transfers one or more of the data streams respectively to the security components. The security network components transmit control information to the load-balancer and the control information includes an instruction regarding balancing load of the data streams between said security network components; The load-balancer balances load based on the control information. Preferably, network address translation is performed by the load-balancer based on the control information or network address translation is performed by the security network component and the control information includes information regarding an expected connection based on the network address translation.
    Type: Grant
    Filed: February 2, 2006
    Date of Patent: September 15, 2015
    Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Omer Schory, Ofer Raz, Oded Gonda
  • Patent number: 8726008
    Abstract: A system and method for protecting data communications in a system including a load-balancer connected to a cluster of security network components, e.g. firewall node. The load-balancer transfers one or more of the data streams respectively to the security components. The security network components transmit control information to the load-balancer and the control information includes an instruction regarding balancing load of the data streams between said components; The load-balancer balances load based on the control information. Preferably, network address translation (NAT) is performed by the load-balancer based on the control information or NAT is performed by the security network component and the control information includes information regarding an expected connection based on NAT.
    Type: Grant
    Filed: March 28, 2012
    Date of Patent: May 13, 2014
    Assignee: Check Point Software Technologies Ltd.
    Inventors: Omer Schory, Ofer Raz, Oded Gonda
  • Publication number: 20120297491
    Abstract: A system and method for protecting data communications in a system including a toad-balancer connected to a cluster of security network components, e.g. firewall node. The load-balancer transfers one or more of the data streams respectively to the security components. The security network components transmit control information to the load-balancer and the control information includes an instruction regarding balancing load of the data streams between said components; The load-balancer balances load based on the control information. Preferably, network address translation (NAT) is performed by the load-balancer based on the control information or NAT is performed by the security network component and the control information includes information regarding an expected connection based on NAT.
    Type: Application
    Filed: March 28, 2012
    Publication date: November 22, 2012
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Omer Schory, Ofer Raz, Oded Gonda
  • Patent number: 7797566
    Abstract: A method for load sharing and high availability in a cluster of computers. The cluster includes a first computer and a second computer which perform a task An active application runs in the first computer and a standby application is installed in the second computer. The active application and the standby application are included in an application group. A first plurality of applications is installed in the first computer; the first plurality includes the running active application. The active application performs the task and stores in memory of the first computer state parameters and a policy. A synchronized copy of the state parameters and the policy pertaining to the task is maintained by storing in memory of the second computer. Preferably, the cluster is in a security gateway between data networks and performs a task related to security of one or more of the networks.
    Type: Grant
    Filed: July 11, 2006
    Date of Patent: September 14, 2010
    Assignee: Check Point Software Technologies Ltd.
    Inventors: Amit Dror, Omer Schory
  • Publication number: 20080016386
    Abstract: A method for load sharing and high availability in a cluster of computers. The cluster includes a first computer and a second computer which perform a task An active application runs in the first computer and a standby application is installed in the second computer. The active application and the standby application are included in an application group. A first plurality of applications is installed in the first computer; the first plurality includes the running active application. The active application performs the task and stores in memory of the first computer state parameters and a policy A synchronized copy of the state parameters and the policy pertaining to the task is maintained by storing in memory of the second computer. Preferably, the cluster is in a security gateway between data networks and performs a task related to security of one or more of the networks.
    Type: Application
    Filed: July 11, 2006
    Publication date: January 17, 2008
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Amit Dror, Omer Schory
  • Publication number: 20070180226
    Abstract: A system and method for protecting data communications in a system including a load-balancer connected to a cluster of security network components, e.g. firewall node. The load-balancer transfers one or more of the data streams respectively to the security components. The security network components transmit control information to the load-balancer and the control information includes an instruction regarding balancing load of the data streams between said security network components; The load-balancer balances load based on the control information. Preferably, network address translation is performed by the load-balancer based on the control information or network address translation is performed by the security network component and the control information includes information regarding an expected connection based on the network address translation.
    Type: Application
    Filed: February 2, 2006
    Publication date: August 2, 2007
    Inventors: Omer Schory, Ofer Raz, Oded Gonda