Patents by Inventor Opher Dubrovsky
Opher Dubrovsky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8239939Abstract: An exemplary computer-implementable method (300) transforms information to reduce or eliminate risk of exploitation of a software service and includes receiving information (304) in response to a request, transforming the information (308) to produce transformed information and sending the transformed information (312). An exemplary firewall server (112) includes server software (144, 148) that allows the firewall server (112) to receive information from a resource (104, 108) via a network and to send information to a client computer (114) and a browser protection component (264, 268) for transforming the information to prevent exploitation of a vulnerability of browser software (154) on the client computer (114). Various other exemplary methods, devices, systems, etc., are also disclosed.Type: GrantFiled: June 27, 2006Date of Patent: August 7, 2012Assignee: Microsoft CorporationInventors: John Dunagan, Opher Dubrovsky, Saher Esmeir, Charles S Reis, Jiahe Helen Wang
-
Patent number: 8225392Abstract: An exemplary computer-implementable method (300) transforms or “immunizes” information to reduce or eliminate risk of exploitation of a known vulnerabilty of a software service and includes receiving information (304) in response to a request, transforming the information (308) to produce transformed information and sending the transformed information (312). An exemplary firewall server (112) includes server software (144, 148) that allows the firewall server (112) to receive information from a resource (104, 108) via a network and to send information to a client computer (114) and an immunization component (264, 268) for immunizing the information to prevent exploitation of a vulnerabilty of browser software (154) on the client computer (114). Various other exemplary methods, devices, systems, etc., are also disclosed.Type: GrantFiled: July 15, 2005Date of Patent: July 17, 2012Assignee: Microsoft CorporationInventors: Opher Dubrovsky, Boaz Ein-Gil, Jiahe Helen Wang
-
Patent number: 7562211Abstract: Encrypted communications between peers are inspected by a proxy server, for bugs, viruses, malicious software and the like, while the proxy server is prevented from modifying the encrypted communications. A proxy server functioning as a gateway processor between the peers includes a security processor. The security processor is coupled to one of the peers via a channel that is separate from the channel carrying the encrypted communications between the peers. Cryptographic keys needed to decrypt the encrypted communications are provided via the separate channel to the security processor prior to commencement of encrypted communications. The security processor monitors the encrypted communications. The security processor decrypts the monitored encrypted communications without perturbing the encrypted communications. The security processor decrypts the encrypted communications utilizing the previously provided cryptographic keys. The security processor inspects the decrypted communications.Type: GrantFiled: October 27, 2005Date of Patent: July 14, 2009Assignee: Microsoft CorporationInventors: Cem Paya, Opher Dubrovsky
-
Publication number: 20090049243Abstract: Aspects of the subject matter described herein relate to caching dynamic content. In aspects, caching components on a requesting entity and on a content server cache requested content. When a request for content similar to cached content is received, the requesting entity sends a request for the content and an identifier of similar cached content to the content server. The content server obtains the requested content and determines the differences between the requested content and the cached content. The content server then sends the differences to the requesting entity. The requesting entity uses the differences and its cached content to construct the requested content and provides the requested content.Type: ApplicationFiled: August 13, 2007Publication date: February 19, 2009Applicant: MICROSOFT CORPORATIONInventors: Opher Dubrovsky, Yossi Siles
-
Publication number: 20070260871Abstract: Encrypted communications between peers are inspected by a proxy server, for bugs, viruses, malicious software and the like, while the proxy server is prevented from modifying the encrypted communications. A proxy server functioning as a gateway processor between the peers includes a security processor. The security processor is coupled to one of the peers via a channel that is separate from the channel carrying the encrypted communications between the peers. Cryptographic keys needed to decrypt the encrypted communications are provided via the separate channel to the security processor prior to commencement of encrypted communications. The security processor monitors the encrypted communications. The security processor decrypts the monitored encrypted communications without perturbing the encrypted communications. The security processor decrypts the encrypted communications utilizing the previously provided cryptographic keys. The security processor inspects the decrypted communications.Type: ApplicationFiled: October 27, 2005Publication date: November 8, 2007Applicant: Microsoft CorporationInventors: Cem Paya, Opher Dubrovsky
-
Publication number: 20070016948Abstract: An exemplary computer-implementable method (300) transforms or “immunizes” information to reduce or eliminate risk of exploitation of a known vulnerabilty of a software service and includes receiving information (304) in response to a request, transforming the information (308) to produce transformed information and sending the transformed information (312). An exemplary firewall server (112) includes server software (144, 148) that allows the firewall server (112) to receive information from a resource (104, 108) via a network and to send information to a client computer (114) and an immunization component (264, 268) for immunizing the information to prevent exploitation of a vulnerabilty of browser software (154) on the client computer (114). Various other exemplary methods, devices, systems, etc., are also disclosed.Type: ApplicationFiled: July 15, 2005Publication date: January 18, 2007Applicant: Microsoft CorporationInventors: Opher Dubrovsky, Boaz Ein-Gil, Jiahe Wang
-
Publication number: 20070016949Abstract: An exemplary computer-implementable method (300) transforms information to reduce or eliminate risk of exploitation of a software service and includes receiving information (304) in response to a request, transforming the information (308) to produce transformed information and sending the transformed information (312). An exemplary firewall server (112) includes server software (144, 148) that allows the firewall server (112) to receive information from a resource (104, 108) via a network and to send information to a client computer (114) and a browser protection component (264, 268) for transforming the information to prevent exploitation of a vulnerability of browser software (154) on the client computer (114). Various other exemplary methods, devices, systems, etc., are also disclosed.Type: ApplicationFiled: June 27, 2006Publication date: January 18, 2007Applicant: Microsoft CorporationInventors: John Dunagan, Opher Dubrovsky, Saher Esmeir, Charles Reis, Jiahe Wang