Patents by Inventor Oren FARAGE
Oren FARAGE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20180227316Abstract: A computerized method of preemptive event handling, The method comprises monitoring, in run time at kernel level, a plurality of events of a plurality of processes executed by an operating system (OS) running on a computing device, detecting, in run time, a first event of the plurality of events, the first event being performed by a first process of the plurality of processes on the computing device, classifying, in run time, the first process as a malware in response to the detection of the first event, and preventing, in run time, the first process from running on the computing device before the first event is processed by the OS.Type: ApplicationFiled: April 3, 2018Publication date: August 9, 2018Applicant: Shine Security Ltd.Inventors: Itay KATZ, Ianir IDESES, Ron PORAT, Alon BLAYER-GAT, Oren FARAGE
-
Publication number: 20180139218Abstract: A computerized method of reverting system data affected by a malware. The method comprises monitoring, in run time, a plurality of events of a plurality of processes executed by an operating system (OS) running on a computing device, logging in an event log, in run time, the plurality of events, classifying, in run time, a first process of the plurality of processes as a malware, identifying a set of events of the first process from the plurality of events using the event log, and reverting, in response to the classification, at least one system object hosted in the computing device to remove an effect of the set of events on the OS.Type: ApplicationFiled: January 15, 2018Publication date: May 17, 2018Applicant: Shine Security Ltd.Inventors: Itay Katz, Ianir Ideses, Ron Porat, Alon Blayer-Gat, Oren Farage
-
Patent number: 9942246Abstract: A computerized method of preemptive event handling, The method comprises monitoring, in run time at kernel level, a plurality of events of a plurality of processes executed by an operating system (OS) running on a computing device, detecting, in run time, a first event of the plurality of events, the first event being performed by a first process of the plurality of processes on the computing device, classifying, in run time, the first process as a malware in response to the detection of the first event, and preventing, in run time, the first process from running on the computing device before the first event is processed by the OS.Type: GrantFiled: August 31, 2014Date of Patent: April 10, 2018Assignee: Shine Security Ltd.Inventors: Itay Katz, Ianir Ideses, Ron Porat, Alon Blayer-Gat, Oren Farage
-
Patent number: 9871809Abstract: A computerized method of reverting system data affected by a malware. The method comprises monitoring, in run time, a plurality of events of a plurality of processes executed by an operating system (OS) running on a computing device, logging in an event log, in run time, the plurality of events, classifying, in run time, a first process of the plurality of processes as a malware, identifying a set of events of the first process from the plurality of events using the event log, and reverting, in response to the classification, at least one system object hosted in the computing device to remove an effect of the set of events on the OS.Type: GrantFiled: August 26, 2014Date of Patent: January 16, 2018Assignee: Shine Security Ltd.Inventors: Itay Katz, Ianir Ideses, Ron Porat, Alon Blayer-Gat, Oren Farage
-
Publication number: 20170060986Abstract: There is provided a method of identifying data object(s) of a predefined content category within a network document for presentation at a client terminal, comprising: receiving, at a network node at an internet service provider level of a network, web resource elements of a network document for rendering and presentation on a display associated with a client terminal; identifying data objects within the network document; extracting classification features from each data object; classifying at least one of the data objects into a predefined content category; generating reformatting instructions for adapting the presentation of the network document to reduce visibility of the data objects classified into the predefined content category upon rendering of the network document; creating a formatted network document by injecting the reformatting instructions into the network document for implementation by a rendering process executing on the client terminal; and transmitting the formatted network document to the clType: ApplicationFiled: August 17, 2016Publication date: March 2, 2017Inventors: Ianir IDESES, Assaf NEUBERGER, Ron PORAT, Oren FARAGE, Itay KATZ, Doron SHAMIA SADEH, Alon BLAYER-GAT
-
Publication number: 20160357966Abstract: A method of identifying one or more malicious threats in a computing device. The device comprises monitoring a plurality of events occurring on a computing device in run time, a plurality of processes executed on the computing device in run time, and a plurality of host activities of the computing device in run time, identifying a compliance of at least some of the plurality of events, the plurality of processes, and the plurality of host activities with a plurality of rules, generating a rule compliance status dataset generated according to the compliance, identifying a match between the rule compliance status dataset and at least one of a plurality of reference profiles each indicative of a computing device operation under a malicious threat activity, and detecting a malicious threat according to the match.Type: ApplicationFiled: August 14, 2016Publication date: December 8, 2016Applicant: Shine Security Ltd.Inventors: Ron PORAT, Andrey BAYORA, Oren FARAGE, Alon BLAYER-GAT
-
Patent number: 9419996Abstract: A method of identifying one or more malicious threats in a computing device. The device comprises monitoring a plurality of events occurring on a computing device in run time, a plurality of processes executed on the computing device in run time, and a plurality of host activities of the computing device in run time, identifying a compliance of at least some of the plurality of events, the plurality of processes, and the plurality of host activities with a plurality of rules, generating a rule compliance status dataset generated according to the compliance, identifying a match between the rule compliance status dataset and at least one of a plurality of reference profiles each indicative of a computing device operation under a malicious threat activity, and detecting a malicious threat according to the match.Type: GrantFiled: May 1, 2013Date of Patent: August 16, 2016Assignee: Shine Security Ltd.Inventors: Ron Porat, Andrey Bayora, Oren Farage, Alon Blayer-Gat
-
Publication number: 20150371267Abstract: There is provided a computer-implemented method for filtering advertisements transmitted through a network to a client, comprising: receiving at a client, from a user of the client, a user preference for filtering of advertisements for display on the client, the advertisements being transmitted over a network from an ad server to the client; transmitting the user preference from the client to a network element located at an intermediate transmission location within the network between the ad server and the client; and filtering the transmitted advertisements at the network element to block or allow advertisements to transmit to the client based on the user preference.Type: ApplicationFiled: June 22, 2015Publication date: December 24, 2015Inventors: Ron PORAT, Oren FARAGE, Ianir IDESES, Itay KATZ, Doron SHAMIA SADEH
-
Publication number: 20150135262Abstract: A method of identifying one or more malicious threats in a computing device. The device comprises monitoring a plurality of events occurring on a computing device in run time, a plurality of processes executed on the computing device in run time, and a plurality of host activities of the computing device in run time, identifying a compliance of at least some of the plurality of events, the plurality of processes, and the plurality of host activities with a plurality of rules, generating a rule compliance status dataset generated according to the compliance, identifying a match between the rule compliance status dataset and at least one of a plurality of reference profiles each indicative of a computing device operation under a malicious threat activity, and detecting a malicious threat according to the match.Type: ApplicationFiled: May 1, 2013Publication date: May 14, 2015Inventors: Ron Porat, Andrey Bayora, Oren Farage, Alon Blayer-Gat
-
Publication number: 20150067859Abstract: A computerized method of preemptive event handling, The method comprises monitoring, in run time at kernel level, a plurality of events of a plurality of processes executed by an operating system (OS) running on a computing device, detecting, in run time, a first event of the plurality of events, the first event being performed by a first process of the plurality of processes on the computing device, classifying, in run time, the first process as a malware in response to the detection of the first event, and preventing, in run time, the first process from running on the computing device before the first event is processed by the OS.Type: ApplicationFiled: August 31, 2014Publication date: March 5, 2015Inventors: Itay KATZ, Ianir IDESES, Ron PORAT, Alon BLAYER-GAT, Oren FARAGE
-
Publication number: 20150058988Abstract: A computerized method of reverting system data affected by a malware. The method comprises monitoring, in run time, a plurality of events of a plurality of processes executed by an operating system (OS) running on a computing device, logging in an event log, in run time, the plurality of events, classifying, in run time, a first process of the plurality of processes as a malware, identifying a set of events of the first process from the plurality of events using the event log, and reverting, in response to the classification, at least one system object hosted in the computing device to remove an effect of the set of events on the OS.Type: ApplicationFiled: August 26, 2014Publication date: February 26, 2015Inventors: Itay KATZ, Ianir IDESES, Ron PORAT, Alon BLAYER-GAT, Oren FARAGE