Patents by Inventor Ron Bitton

Ron Bitton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250111092
    Abstract: A method includes receiving, at a server from a user device, a user query to a large language model (LLM), creating an LLM query from the user query and an application context, gathering confidential information from the LLM query, and sending the LLM query to the LLM. The method includes receiving, from the LLM, an LLM response to the LLM query, comparing the LLM response to the confidential information to generate comparison result, and setting a leakage detection signal based on comparison result.
    Type: Application
    Filed: September 29, 2023
    Publication date: April 3, 2025
    Applicant: Intuit Inc.
    Inventors: Itsik Yizbak MANTIN, Ron BITTON
  • Publication number: 20250111039
    Abstract: A method includes receiving, at a server from a user device, a user query to a large language model (LLM), creating an LLM query from the user query, inserting an security marker instruction into the LLM query to trigger an injection of a security marker, and sending the LLM query to the LLM. The method further includes receiving, from the LLM, an LLM response to the LLM query, evaluating the LLM response to detect whether the security marker is present in the LLM response, and setting a prompt injection signal based on whether the security marker is present in the LLM response.
    Type: Application
    Filed: September 29, 2023
    Publication date: April 3, 2025
    Applicant: Intuit Inc.
    Inventors: Itsik Yizbak MANTIN, Ron BITTON, Yael MATHOV GOME, Gal COHEN
  • Publication number: 20250111051
    Abstract: A method including receiving, at a large language model, a prompt injection cyberattack. The method also includes executing the large language model. The large language model takes, as input, the prompt injection cyberattack and generates a first output. The method also includes receiving, by a guardian controller, the first output of the large language model. The guardian controller includes a machine learning model and a security application. The method also includes determining a probability that the first output of the large language model is poisoned by the prompt injection cyberattack. The method also includes determining whether the probability satisfies a threshold. The method also includes enforcing, by the guardian controller and responsive to the probability satisfying the threshold, a security scheme on use of the first output of the large language model by a control application. Enforcing the security scheme mitigates the prompt injection cyberattack.
    Type: Application
    Filed: September 29, 2023
    Publication date: April 3, 2025
    Applicant: Intuit Inc.
    Inventors: Itsik Yizbak MANTIN, Ron BITTON
  • Patent number: 12218960
    Abstract: An information collection system includes: a side-channel information processing unit that derives load information to estimate an impact on the availability of a target machine for active scanning by using side-channel data; an allow list generation unit that generates an allow list including a scan timing and a scan range in which the availability is not affected, the allow list generation unit generating the allow list based on the load information; and an allow list storage unit that stores the allow list. An active scan of the target machine is executed by referencing the allow list stored in the allow list storage unit to collect asset information of the target machine.
    Type: Grant
    Filed: June 12, 2018
    Date of Patent: February 4, 2025
    Assignees: NEC CORPORATION, B.G. NEGEV TECHNOLOGIES AND APPLICATIONS LTD.
    Inventors: Yoshiyuki Yamada, Masaki Inokuchi, Yoshinobu Ohta, Yuval Elovici, Asaf Shabtai, Ron Bitton
  • Publication number: 20240371134
    Abstract: An AI-based method for real-time detection and mitigation of attacks on object detectors being fed by input images acquired by one or more imagers, comprising the steps of mapping normal attributes of the outputs of an ML-model associated with the object detectors, using unsupervised learning; creating an anomaly detection model being capable of identifying adversarial attacks in the form of adversarial patches, based solely on the outputs of the object detectors and without accessing the object detectors model or any original frames acquired by the one or more imagers; calculating the anomaly score for each object being detected by the ML-model object detectors; comparing the anomaly scores of the detected objects to a preset threshold; protecting the object detectors against the attacks by identifying and mitigating the effects of the adversarial patch attacks using the comparison results.
    Type: Application
    Filed: May 2, 2024
    Publication date: November 7, 2024
    Inventors: Dan AVRAHAM, Avishag SHAPIRA, Ron BITTON, Asaf SHABTAI, David MIMRAN, Yuval ELOVICI, Oleg BRODT, Heiko LEHMANN
  • Patent number: 11909754
    Abstract: A security assessment system is configured to provide a duplicated environment which duplicates an assessment target system comprising a plurality of physical components. The security assessment system includes a duplicated environment design circuitry and a duplicated environment construction circuitry. The duplicated environment design circuitry is configured to select a duplication level based on constraints specified by a user in order to design the duplicated environment to produce a designed result indicative of a duplicated environment design. The duplication level is indicative of any one of a simulation sub-module, an emulation sub-module, and a physical sub-module which are for reproducing the physical components of the assessment target system. The duplicated environment construction circuitry is configured to construct the duplicated environment based on the designed result. The duplicated environment includes components which are duplicated by one of the duplication level.
    Type: Grant
    Filed: March 14, 2018
    Date of Patent: February 20, 2024
    Assignees: NEC CORPORATION, B.G. Negev Technologies and Applications Ltd., at Ben-Gurion University
    Inventors: Masaki Inokuchi, Yoshinobu Ohta, Ron Bitton, Orly Stan, Asaf Shabtai, Yuval Elovici
  • Patent number: 11783048
    Abstract: A security assessment system is configured to provide a duplicated environment which duplicates an assessment target system comprising a plurality of physical components. The security assessment system includes a duplicated environment design circuitry and a duplicated environment construction circuitry. The duplicated environment design circuitry is configured to select a duplication level based on constraints specified by a user and effects associated with the physical components in order to design the duplicated environment to produce a designed result indicative of a duplicated environment design. The duplication level is indicative of any one of a simulation sub-module, an emulation sub-module, and a physical sub-module which are for reproducing the physical components of the assessment target system. The duplicated environment construction circuitry is configured to construct the duplicated environment based on the designed result.
    Type: Grant
    Filed: March 14, 2018
    Date of Patent: October 10, 2023
    Assignees: NEC CORPORATION, B. G. Negev Technologies and Applications Ltd., at Ben-Gurion University
    Inventors: Masaki Inokuchi, Yoshinobu Ohta, Ron Bitton, Orly Stan, Tomer Gluck, Asaf Shabtai, Yuval Elovici
  • Publication number: 20230214496
    Abstract: The knowledge generation apparatus (2000) obtains a plural pieces of attack result information (100), which includes a configuration of an attack performed on the computer environment, a configuration of the computer environment attacked, and a result of the attack. By comparing the obtained attack result information (100), the knowledge generation apparatus (2000) detects environment conditions, which is regarding the configuration of the computer environment that are necessary for the success of the attack. The knowledge generation apparatus (2000) performs selection on the detected environment conditions based on a selection rule (200), and generates the knowledge information (300) that includes the selected environment conditions. The selection rule represents a rule for determining whether to include the environment condition in the knowledge information (300), with respect to a feature of a set of attacks that are affected by the environment condition.
    Type: Application
    Filed: May 29, 2020
    Publication date: July 6, 2023
    Applicants: NEC Corporation, B. G. Negev Technologies and Applications Ltd., at Ben-Gurion University
    Inventors: Masaki INOKUCHI, Tomohiko YAGYU, Yuval ELOVICI, Asaf SHABTAI, Ron BITTON, Noam MOSCOVICH
  • Patent number: 11601452
    Abstract: Described embodiments include a system that includes a monitoring agent, configured to automatically monitor usage of a computing device by a user, and a processor. The processor is configured to compute, based on the monitoring, a score indicative of a cyber-security awareness of the user, and to generate an output indicative of the score.
    Type: Grant
    Filed: October 21, 2019
    Date of Patent: March 7, 2023
    Assignee: B.G. NEGEV TECHNOLOGIES AND APPLICATIONS LTD.
    Inventors: Asaf Shabtai, Rami Puzis, Lior Rokach, Liran Orevi, Genady Malinsky, Ziv Katzir, Ron Bitton
  • Publication number: 20230040982
    Abstract: An attack information processing apparatus (10) includes an extraction unit (11) configured to extract first and second attack knowledge pieces indicating conditions of a cyber attack from first and second attack information pieces including descriptions of the cyber attack, a determination unit (12) configured to determine similarity between the first and second attack information pieces, and a complementing unit (13) configured to complement the first attack knowledge piece with the second attack knowledge piece based on the determined similarity.
    Type: Application
    Filed: January 17, 2020
    Publication date: February 9, 2023
    Applicants: NEC CORPORATION, B. G. Negev Technologies and Applications Ltd., at Ben-Gurion University
    Inventors: Masaki INOKUCHI, Tomohiko YAGYU, Asaf SHABTAI, Yuval ELOVICI, Ron BITTON, Hodaya BINYAMINI
  • Publication number: 20210250370
    Abstract: A security assessment system is configured to provide a duplicated environment which duplicates an assessment target system comprising a plurality of physical components. The security assessment system includes a duplicated environment design circuitry and a duplicated environment construction circuitry, The duplicated environment design circuitry is configured to select a duplication level based on constraints specified by a user in order to design the duplicated environment to produce a designed result indicative of a duplicated environment design. The duplication level is indicative of any one of a simulation sub-module, an emulation sub-module, and a physical sub-module which are for reproducing the physical components of the assessment target system. The duplicated environment construction circuitry is configured to construct the duplicated environment based on the designed result.
    Type: Application
    Filed: March 14, 2018
    Publication date: August 12, 2021
    Applicants: NEC CORPORATION, B. G. Negev Technologies and Applications Ltd.,at Ben-Gurion University.
    Inventors: Masaki INOKUCHI, Yoshinobu OHTA, Ron BITTON, Orly STAN, Asaf SHABTAI, Yuval ELOVICI
  • Publication number: 20210243213
    Abstract: An information collection system includes: a side-channel information processing unit that derives load information to estimate an impact on the availability of a target machine for active scanning by using side-channel data; an allow list generation unit that generates an allow list including a scan timing and a scan range in which the availability is not affected, the allow list generation unit generating the allow list based on the load information; and an allow list storage unit that stores the allow list. An active scan of the target machine is executed by referencing the allow list stored in the allow list storage unit to collect asset information of the target machine.
    Type: Application
    Filed: June 12, 2018
    Publication date: August 5, 2021
    Applicants: NEC CORPORATION, B.G. Negev Technologies and Applications Ltd., at Ben-Gurion University
    Inventors: Yoshiyuki YAMADA, Masaki INOKUCHI, Yoshinobu OHTA, Yuval ELOVICI, Asaf SHABTAI, Ron BITTON
  • Publication number: 20210042423
    Abstract: A security assessment system is configured to provide a duplicated environment which duplicates an assessment target system comprising a plurality of physical components. The security assessment system includes a duplicated environment design circuitry and a duplicated environment construction circuitry. The duplicated environment design circuitry is configured to select a duplication level based on constraints specified by a user and effects associated with the physical components in order to design the duplicated environment to produce a designed result indicative of a duplicated environment design. The duplication level is indicative of any one of a simulation sub-module, an emulation sub-module, and a physical sub-module which are for reproducing the physical components of the assessment target system. The duplicated environment construction circuitry is configured to construct the duplicated environment based on the designed result.
    Type: Application
    Filed: March 14, 2018
    Publication date: February 11, 2021
    Applicants: NEC CORPORATION, B. G. Negev Technologies and Applications Ltd., at Ben-Gurion University
    Inventors: Masaki INOKUCHI, Yoshinobu OHTA, Ron BITTON, Orly STAN, Tomer GLUCK, Asaf SHABTAI, Yuval ELOVICI
  • Publication number: 20200053114
    Abstract: Described embodiments include a system that includes a monitoring agent, configured to automatically monitor usage of a computing device by a user, and a processor. The processor is configured to compute, based on the monitoring, a score indicative of a cyber-security awareness of the user, and to generate an output indicative of the score.
    Type: Application
    Filed: October 21, 2019
    Publication date: February 13, 2020
    Inventors: Asaf Shabtai, Rami Puzis, Lior Rokach, Liran Orevi, Genady Malinsky, Ziv Katzir, Ron Bitton
  • Patent number: 10454958
    Abstract: Described embodiments include a system that includes a monitoring agent, configured to automatically monitor usage of a computing device by a user, and a processor. The processor is configured to compute, based on the monitoring, a score indicative of a cyber-security awareness of the user, and to generate an output indicative of the score.
    Type: Grant
    Filed: October 12, 2016
    Date of Patent: October 22, 2019
    Assignee: VERINT SYSTEMS LTD.
    Inventors: Asaf Shabtai, Rami Puzis, Lior Rokach, Liran Orevi, Genady Malinsky, Ziv Katzir, Ron Bitton
  • Publication number: 20170104778
    Abstract: Described embodiments include a system that includes a monitoring agent, configured to automatically monitor usage of a computing device by a user, and a processor. The processor is configured to compute, based on the monitoring, a score indicative of a cyber-security awareness of the user, and to generate an output indicative of the score.
    Type: Application
    Filed: October 12, 2016
    Publication date: April 13, 2017
    Inventors: Asaf Shabtai, Rami Puzis, Lior Rokach, Liran Orevi, Genady Malinsky, Ziv Katzir, Ron Bitton