Patents by Inventor Rami Mizrahi

Rami Mizrahi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11706248
    Abstract: A computer-implemented method for computing or modeling the risk of a cyber security breach to an asset begins by gathering coverage information from network sensors, endpoint agents, and decoys related to the asset, as well as gathering importance information related to the asset, alerts and anomalies from an enterprise and vulnerability information related to the asset. From this, a threat-score is computed for the asset. Connections or coupling information is gathered between users and assets, users and data, and assets and data, which is fused to generate a 3-dimensional vector representation of coverage, importance, and threat-score of the assets, users and data. From this 3-dimensional vector, an asset risk score is computed to provide the asset risk score.
    Type: Grant
    Filed: February 1, 2021
    Date of Patent: July 18, 2023
    Assignee: Fidelis Cybersecurity, Inc.
    Inventors: Anubhav Arora, Abhishek Sharma, Rami Mizrahi, Gerald Mancini, Abdul Rahman
  • Publication number: 20230153872
    Abstract: A method and system for generating and maintaining an immutable electronic ledger. The method comprises receiving, accessing, and/or modifying one or more decision-influencing factors relating to a commodity and/or a product. The method comprises autonomously storing the one or more decision-influencing factors as a part of the immutable electronic ledger in response to said receiving, accessing, and/or modifying. The immutable electronic ledger serves as a record of decision-influencing factors, that is free of hindsight, for a business entity in an evaluation of a decision associated with the commodity and/or product and influenced by the one or more decision-influencing factors.
    Type: Application
    Filed: November 16, 2022
    Publication date: May 18, 2023
    Inventors: Eyal Mizrahi, Rami Mizrahi, Daniel Goland, Michael Pedersen, Tamir Shalom, Dekel Yossef
  • Publication number: 20220044341
    Abstract: A system and method for rapid evaluation of raw material price risk mitigation contracts aided by simulations driven by an end-user's selection of a settlement parameter, which enable transparent and quick evaluations of one or more contracts. The simulations are presented on a user interface that provides for a unique communication of information relevant to the one or more contracts. An end-user's selection of a settlement parameter is enabled by a digital slider, the actuation of which presents updated simulations in substantially real-time.
    Type: Application
    Filed: October 29, 2019
    Publication date: February 10, 2022
    Inventors: Rami Mizrahi, Tamir Shalom, Daniel Goland, Dekel Yossef, Eyal Mizrahi, Dor Tzemach
  • Publication number: 20210243223
    Abstract: A computer-implemented method for computing or modeling the risk of a cyber security breach to an asset begins by gathering coverage information from network sensors, endpoint agents, and decoys related to the asset, as well as gathering importance information related to the asset, alerts and anomalies from an enterprise and vulnerability information related to the asset. From this, a threat-score is computed for the asset. Connections or coupling information is gathered between users and assets, users and data, and assets and data, which is fused to generate a 3-dimensional vector representation of coverage, importance, and threat-score of the assets, users and data. From this 3-dimensional vector, an asset risk score is computed to provide the asset risk score.
    Type: Application
    Filed: February 1, 2021
    Publication date: August 5, 2021
    Inventors: Anubhav Arora, Abhishek Sharma, Rami Mizrahi, Gerald Mancini, Abdul Rahman
  • Patent number: 10015193
    Abstract: A device and a method for identifying whether a network node is infected by malware, including identifying indicator events for each of a plurality of anomaly indicators, by counting the number of occurrences of an anomaly indicator in at least one of a network node and an entire network during a predetermined time duration and if the number of occurrences of the anomaly indicator during the predetermined time duration is greater than a predetermined event threshold, identifying an indicator event associated with the anomaly indicator during the predetermined time duration and assigning an expiration duration for the indicator event, determining whether the identified indicator events fulfill at least one predetermined infection rule, and if the indicator events fulfill the at least one predetermined infection rule, identifying the network node as infected by malware.
    Type: Grant
    Filed: December 2, 2015
    Date of Patent: July 3, 2018
    Assignee: TOPSPIN SECURITY LTD
    Inventors: Doron Kolton, Rami Mizrahi, Manor Hemel, Omer Zohar
  • Patent number: 9992225
    Abstract: A system for gathering information about malware and a method of use therefor, the system comprising a working environment including physical working environment servers, physical working environment endpoints, a working environment network, a switch, and a router directing traffic between said working environment network and an external network, a decoy environment including at least one physical machine, a decoy environment server, a decoy environment endpoint, a decoy environment network and a decoy environment router, a file directing mechanism directing at least some files to the decoy environment, and a threat tracking mechanism tracking and observing actions triggered by the files in the decoy environment.
    Type: Grant
    Filed: September 8, 2015
    Date of Patent: June 5, 2018
    Inventors: Doron Kolton, Rami Mizrahi, Omer Zohar, Benny Ben-Rabi, Alex Barbalat, Shlomi Gabai
  • Patent number: 9807115
    Abstract: A system and a method for identifying the presence of ransomware on a network including a plurality of resources, and for trapping the ransomware therein.
    Type: Grant
    Filed: July 18, 2016
    Date of Patent: October 31, 2017
    Assignee: TOPSPIN SECURITY LTD
    Inventors: Doron Kolton, Rami Mizrahi, Omer Zohar, Benny Ben-Rabi, Alex Barbalat, Shlomi Gabai
  • Patent number: 9807114
    Abstract: A system for identifying the presence of advanced persistent threats on a network including a plurality of resources, interconnected to form a network, at least one decoy resource, at least one mini-trap installed on at least one of the plurality of resources and functionally associated with at one of the at least one decoy resource, the at least one mini-trap comprising deceptive information directing malware accessing the at least one mini-trap to the decoy resource associated therewith, and a manager node forming part of the network, locally or remotely, and configured to manage placement of the at least one mini-trap on the at least one of the plurality of resources and association between the at least one mini-trap and the decoy resource associated therewith.
    Type: Grant
    Filed: September 3, 2015
    Date of Patent: October 31, 2017
    Assignee: TOPSPIN SECURTIY LTD
    Inventors: Doron Kolton, Rami Mizrahi, Omer Zohar, Benny Ben-Rabi, Alex Barbalat, Shlomi Gabai
  • Publication number: 20160323316
    Abstract: A system and a method for identifying the presence of ransomware on a network including a plurality of resources, and for trapping the ransomware therein.
    Type: Application
    Filed: July 18, 2016
    Publication date: November 3, 2016
    Inventors: Doron Kolton, Rami Mizrahi, Omer Zohar, Benny Ben-Rabi, Alex Barbalat, Shlomi Gabai
  • Publication number: 20160112440
    Abstract: A device and a method for identifying whether a network node is infected by malware, including identifying indicator events for each of a plurality of anomaly indicators, by counting the number of occurrences of an anomaly indicator in at least one of a network node and an entire network during a predetermined time duration and if the number of occurrences of the anomaly indicator during the predetermined time duration is greater than a predetermined event threshold, identifying an indicator event associated with the anomaly indicator during the predetermined time duration and assigning an expiration duration for the indicator event, determining whether the identified indicator events fulfill at least one predetermined infection rule, and if the indicator events fulfill the at least one predetermined infection rule, identifying the network node as infected by malware.
    Type: Application
    Filed: December 2, 2015
    Publication date: April 21, 2016
    Inventors: Doron KOLTON, Rami MIZRAHI, Manor HEMEL, Omer ZOHAR
  • Publication number: 20160080414
    Abstract: A system for gathering information about malware and a method of use therefor, the system comprising a working environment including physical working environment servers, physical working environment endpoints, a working environment network, a switch, and a router directing traffic between said working environment network and an external network, a decoy environment including at least one physical machine, a decoy environment server, a decoy environment endpoint, a decoy environment network and a decoy environment router, a file directing mechanism directing at least some files to the decoy environment, and a threat tracking mechanism tracking and observing actions triggered by the files in the decoy environment.
    Type: Application
    Filed: September 8, 2015
    Publication date: March 17, 2016
    Inventors: Doron Kolton, Rami Mizrahi, Omer Zohar, Benny Ben-Rabi, Alex Barbalat, Shlomi Gabai
  • Publication number: 20160072838
    Abstract: A system for identifying the presence of advanced persistent threats on a network including a plurality of resources, interconnected to form a network, at least one decoy resource, at least one mini-trap installed on at least one of the plurality of resources and functionally associated with at one of the at least one decoy resource, the at least one mini-trap comprising deceptive information directing malware accessing the at least one mini-trap to the decoy resource associated therewith, and a manager node forming part of the network, locally or remotely, and configured to manage placement of the at least one mini-trap on the at least one of the plurality of resources and association between the at least one mini-trap and the decoy resource associated therewith.
    Type: Application
    Filed: September 3, 2015
    Publication date: March 10, 2016
    Inventors: Doron Kolton, Rami Mizrahi, Omer Zohar, Benny Ben-Rabi, Alex Barbalat, Shlomi Gabai
  • Patent number: 8429751
    Abstract: A system and method for protection of Web based applications are described. Anomalous traffic can be identified by comparing the traffic to a profile of acceptable user traffic when interacting with the application. Phishing and leeching are one type of anomalous traffic that is detected. The anomalous traffic, or security events, identified at the individual computer networks are communicated to a central security manager. Various responsive actions may be taken in response to detection of phishing or leeching.
    Type: Grant
    Filed: March 12, 2010
    Date of Patent: April 23, 2013
    Assignee: Trustwave Holdings, Inc.
    Inventors: Rami Mizrahi, Galit Efron-Nitzan, Or Katz
  • Patent number: 8180886
    Abstract: In one embodiment, a method for securing a network application is described. The method for securing a network application includes receiving network information within a network application and assigning a probability value to an independent aspect of the network information. The probability value is based on a verification of the independent aspect of the information against a profile of acceptable behavior. The method for securing a network application also includes aggregating the probability values of the independent aspects of the network information to determine the probability of the entire network traffic. In addition, the method for securing a network application includes determining whether the probability value of the entire network information is above or below a threshold probability value. The entire network information is screened out based on the probability value of the entire message with respect to the threshold probability value.
    Type: Grant
    Filed: November 13, 2008
    Date of Patent: May 15, 2012
    Assignee: TrustWave Holdings, Inc.
    Inventors: Kevin Overcash, Doron Kolton, Rami Mizrahi
  • Patent number: 7934253
    Abstract: A system and method for protection of Web based applications are described. The techniques described provide an enterprise wide approach to preventing attacks of Web based applications. Individual computer networks within the enterprise monitor network traffic to identify anomalous traffic. The anomalous traffic can be identified by comparing the traffic to a profile of acceptable user traffic when interacting with the application. The anomalous traffic, or security events, identified at the individual computer networks are communicated to a central security manager. The central security manager correlates the security events at the individual computer networks to determine if there is an enterprise wide security threat. The central security manager can then communicate instructions to the individual computer networks so as to provide an enterprise wide solution to the threat.
    Type: Grant
    Filed: September 14, 2006
    Date of Patent: April 26, 2011
    Assignee: TrustWave Holdings, Inc.
    Inventors: Kevin Overcash, Kate Delikat, Rami Mizrahi, Galit Efron, Doron Kolton, Asaf Wexler, Netta Gavrieli, Yoram Zahavi
  • Publication number: 20100235918
    Abstract: A system and method for protection of Web based applications are described. Anomalous traffic can be identified by comparing the traffic to a profile of acceptable user traffic when interacting with the application. Phishing and leeching are one type of anomalous traffic that is detected. The anomalous traffic, or security events, identified at the individual computer networks are communicated to a central security manager. Various responsive actions may be taken in response to detection of phishing or leeching.
    Type: Application
    Filed: March 12, 2010
    Publication date: September 16, 2010
    Inventors: Rami Mizrahi, Galit Efron-Nitzan, Or Katz
  • Publication number: 20100192201
    Abstract: A system and method for protection of Web based applications are described. Anomalous traffic can be identified by comparing the traffic to a profile of acceptable user traffic when interacting with the application. Excessive access rates are one type of anomalous traffic that is detected by monitoring a source and determining whether the number of requests that the source generates within a specific time frame is above a threshold. The anomalous traffic, or security events, identified at the individual computer networks are communicated to a central security manager. The central security manager correlates the security events at the individual computer networks to determine if there is an enterprise wide security threat. The central security manager can then communicate instructions to the individual computer networks so as to provide an enterprise wide solution to the threat. Various responsive actions may be taken in response to detection of an excessive access rate.
    Type: Application
    Filed: January 29, 2010
    Publication date: July 29, 2010
    Applicant: Breach Security, Inc.
    Inventors: Asaf Shimoni, Galit Efron-Nitzan, Ofer Shezaf, Rami Mizrahi
  • Publication number: 20090138592
    Abstract: In one embodiment, a method for securing a network application is described. The method for securing a network application includes receiving network information within a network application and assigning a probability value to an independent aspect of the network information. The probability value is based on a verification of the independent aspect of the information against a profile of acceptable behavior. The method for securing a network application also includes aggregating the probability values of the independent aspects of the network information to determine the probability of the entire network traffic. In addition, the method for securing a network application includes determining whether the probability value of the entire network information is above or below a threshold probability value. The entire network information is screened out based on the probability value of the entire message with respect to the threshold probability value.
    Type: Application
    Filed: November 13, 2008
    Publication date: May 28, 2009
    Inventors: Kevin Overcash, Doron Kolton, Rami Mizrahi
  • Publication number: 20080047009
    Abstract: A system and method for protection of Web based applications are described. A Web application security system is included within a computer network to monitor traffic received from a wide area network, such as the Internet, and determine if there is a threat to the Web application. The Web application security system monitors web traffic in a non-inline configuration and identifies any anomalous traffic against a profile that identifies acceptable behavior of a user of the application. Any anomalous traffic is analyzed and appropriate protective action is taken to secure the Web application against an attack.
    Type: Application
    Filed: July 20, 2006
    Publication date: February 21, 2008
    Inventors: Kevin Overcash, Kate Delikat, Rami Mizrahi, Galit Efron (Njtzan), Doron Kolton, Asaf Wexler, Netta Gavrieli, Yoram Zahavi
  • Publication number: 20080034425
    Abstract: A system and method for protection of Web based applications are described. The techniques described provide an enterprise wide approach to preventing attacks of Web based applications. Individual computer networks within the enterprise monitor network traffic to identify anomalous traffic. The anomalous traffic can be identified by comparing the traffic to a profile of acceptable user traffic when interacting with the application. The anomalous traffic, or security events, identified at the individual computer networks are communicated to a central security manager. The central security manager correlates the security events at the individual computer networks to determine if there is an enterprise wide security threat.
    Type: Application
    Filed: September 14, 2006
    Publication date: February 7, 2008
    Inventors: Kevin Overcash, Kate Delikate, Rami Mizrahi, Galit Efron, Doron Kolton, Asaf Wexler, Netta Gavrieli, Yoram Zahavi