Patents by Inventor Opher Dubrovsky

Opher Dubrovsky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8239939
    Abstract: An exemplary computer-implementable method (300) transforms information to reduce or eliminate risk of exploitation of a software service and includes receiving information (304) in response to a request, transforming the information (308) to produce transformed information and sending the transformed information (312). An exemplary firewall server (112) includes server software (144, 148) that allows the firewall server (112) to receive information from a resource (104, 108) via a network and to send information to a client computer (114) and a browser protection component (264, 268) for transforming the information to prevent exploitation of a vulnerability of browser software (154) on the client computer (114). Various other exemplary methods, devices, systems, etc., are also disclosed.
    Type: Grant
    Filed: June 27, 2006
    Date of Patent: August 7, 2012
    Assignee: Microsoft Corporation
    Inventors: John Dunagan, Opher Dubrovsky, Saher Esmeir, Charles S Reis, Jiahe Helen Wang
  • Patent number: 8225392
    Abstract: An exemplary computer-implementable method (300) transforms or “immunizes” information to reduce or eliminate risk of exploitation of a known vulnerabilty of a software service and includes receiving information (304) in response to a request, transforming the information (308) to produce transformed information and sending the transformed information (312). An exemplary firewall server (112) includes server software (144, 148) that allows the firewall server (112) to receive information from a resource (104, 108) via a network and to send information to a client computer (114) and an immunization component (264, 268) for immunizing the information to prevent exploitation of a vulnerabilty of browser software (154) on the client computer (114). Various other exemplary methods, devices, systems, etc., are also disclosed.
    Type: Grant
    Filed: July 15, 2005
    Date of Patent: July 17, 2012
    Assignee: Microsoft Corporation
    Inventors: Opher Dubrovsky, Boaz Ein-Gil, Jiahe Helen Wang
  • Patent number: 7562211
    Abstract: Encrypted communications between peers are inspected by a proxy server, for bugs, viruses, malicious software and the like, while the proxy server is prevented from modifying the encrypted communications. A proxy server functioning as a gateway processor between the peers includes a security processor. The security processor is coupled to one of the peers via a channel that is separate from the channel carrying the encrypted communications between the peers. Cryptographic keys needed to decrypt the encrypted communications are provided via the separate channel to the security processor prior to commencement of encrypted communications. The security processor monitors the encrypted communications. The security processor decrypts the monitored encrypted communications without perturbing the encrypted communications. The security processor decrypts the encrypted communications utilizing the previously provided cryptographic keys. The security processor inspects the decrypted communications.
    Type: Grant
    Filed: October 27, 2005
    Date of Patent: July 14, 2009
    Assignee: Microsoft Corporation
    Inventors: Cem Paya, Opher Dubrovsky
  • Publication number: 20090049243
    Abstract: Aspects of the subject matter described herein relate to caching dynamic content. In aspects, caching components on a requesting entity and on a content server cache requested content. When a request for content similar to cached content is received, the requesting entity sends a request for the content and an identifier of similar cached content to the content server. The content server obtains the requested content and determines the differences between the requested content and the cached content. The content server then sends the differences to the requesting entity. The requesting entity uses the differences and its cached content to construct the requested content and provides the requested content.
    Type: Application
    Filed: August 13, 2007
    Publication date: February 19, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Opher Dubrovsky, Yossi Siles
  • Publication number: 20070260871
    Abstract: Encrypted communications between peers are inspected by a proxy server, for bugs, viruses, malicious software and the like, while the proxy server is prevented from modifying the encrypted communications. A proxy server functioning as a gateway processor between the peers includes a security processor. The security processor is coupled to one of the peers via a channel that is separate from the channel carrying the encrypted communications between the peers. Cryptographic keys needed to decrypt the encrypted communications are provided via the separate channel to the security processor prior to commencement of encrypted communications. The security processor monitors the encrypted communications. The security processor decrypts the monitored encrypted communications without perturbing the encrypted communications. The security processor decrypts the encrypted communications utilizing the previously provided cryptographic keys. The security processor inspects the decrypted communications.
    Type: Application
    Filed: October 27, 2005
    Publication date: November 8, 2007
    Applicant: Microsoft Corporation
    Inventors: Cem Paya, Opher Dubrovsky
  • Publication number: 20070016948
    Abstract: An exemplary computer-implementable method (300) transforms or “immunizes” information to reduce or eliminate risk of exploitation of a known vulnerabilty of a software service and includes receiving information (304) in response to a request, transforming the information (308) to produce transformed information and sending the transformed information (312). An exemplary firewall server (112) includes server software (144, 148) that allows the firewall server (112) to receive information from a resource (104, 108) via a network and to send information to a client computer (114) and an immunization component (264, 268) for immunizing the information to prevent exploitation of a vulnerabilty of browser software (154) on the client computer (114). Various other exemplary methods, devices, systems, etc., are also disclosed.
    Type: Application
    Filed: July 15, 2005
    Publication date: January 18, 2007
    Applicant: Microsoft Corporation
    Inventors: Opher Dubrovsky, Boaz Ein-Gil, Jiahe Wang
  • Publication number: 20070016949
    Abstract: An exemplary computer-implementable method (300) transforms information to reduce or eliminate risk of exploitation of a software service and includes receiving information (304) in response to a request, transforming the information (308) to produce transformed information and sending the transformed information (312). An exemplary firewall server (112) includes server software (144, 148) that allows the firewall server (112) to receive information from a resource (104, 108) via a network and to send information to a client computer (114) and a browser protection component (264, 268) for transforming the information to prevent exploitation of a vulnerability of browser software (154) on the client computer (114). Various other exemplary methods, devices, systems, etc., are also disclosed.
    Type: Application
    Filed: June 27, 2006
    Publication date: January 18, 2007
    Applicant: Microsoft Corporation
    Inventors: John Dunagan, Opher Dubrovsky, Saher Esmeir, Charles Reis, Jiahe Wang