Patents by Inventor Ori Aldor

Ori Aldor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150288710
    Abstract: A method includes discovering identities of one or more applications that run on one or more Virtual Machines (VMs) at a given time. A set of signatures, which characterize hostile traffic that is expected to threaten the discovered applications, is selected. Network traffic exchanged with the one or more VMs for is searched for the hostile traffic using the selected set of signatures.
    Type: Application
    Filed: March 10, 2015
    Publication date: October 8, 2015
    Inventors: Ariel Zeitlin, Ori Aldor
  • Patent number: 8176539
    Abstract: The present invention discloses methods, media, and gateways for protecting against cookie-poisoning attacks in networked-communication applications. Methods include the steps of: creating a protected gateway cookie, generated by a gateway, for a server cookie, generated by a server, wherein the server cookie is received by the gateway in an HTTP response message; and validating, by the gateway, that a client cookie from a client request has a corresponding gateway cookie with expected field values. Preferably, the field values include at least one field value selected from the group consisting of: a name, a hash value computed over the server cookie, a hash-function index, a timestamp, a nonce, a hash value computed over newly-generated values, a path, a domain, an expiration, and an HTTP-only value. Preferably, the gateway cookie is signed with a secret key. Most preferably, the secret key is generated by a secret seed.
    Type: Grant
    Filed: October 28, 2008
    Date of Patent: May 8, 2012
    Assignee: Check Point Software Technologies Ltd.
    Inventors: Ori Aldor, Neta Solomon
  • Publication number: 20100138910
    Abstract: The present invention discloses methods, media, and perimeter gateways for encrypted-traffic URL filtering using address-mapping interception, methods including the steps of: providing a client system having a client application for accessing websites from web servers; upon the client application attempting to access an encrypted website, performing a name-to-address query to resolve a name of the encrypted website; intercepting address-mapping responses; creating a mapping between the name and at least one network address of the encrypted website; intercepting incoming encrypted traffic; extracting a server's network address from the incoming encrypted traffic; establishing a resolved name being accessed using the mapping; and filtering the resolved name. Preferably, the step of filtering includes redirecting the encrypted traffic. Preferably, the method further includes the step of: blocking all encrypted traffic for unresolved names.
    Type: Application
    Filed: December 3, 2008
    Publication date: June 3, 2010
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES, LTD.
    Inventors: Ori Aldor, Guy Guzner, Izhar Shoshani-Levi, Eytan Segal
  • Publication number: 20100107234
    Abstract: The present invention discloses methods, media, and gateways for protecting against cookie-poisoning attacks in networked-communication applications. Methods include the steps of: creating a protected gateway cookie, generated by a gateway, for a server cookie, generated by a server, wherein the server cookie is received by the gateway in an HTTP response message; and validating, by the gateway, that a client cookie from a client request has a corresponding gateway cookie with expected field values. Preferably, the field values include at least one field value selected from the group consisting of: a name, a hash value computed over the server cookie, a hash-function index, a timestamp, a nonce, a hash value computed over newly-generated values, a path, a domain, an expiration, and an HTTP-only value. Preferably, the gateway cookie is signed with a secret key. Most preferably, the secret key is generated by a secret seed.
    Type: Application
    Filed: October 28, 2008
    Publication date: April 29, 2010
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES, LTD.
    Inventors: Ori Aldor, Neta Solomon