Patents by Inventor SHAHAR KOHANIM
SHAHAR KOHANIM has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11652852Abstract: A security manager configured to generate a plurality of learned security policies and provide at least one learned security policy and a security agent to a client machine for enforcement of the at least one learned security policy by the security agent on the client machine. The security manager configured to receive alerts from the security agent indicating anomalous behavior on the client machine.Type: GrantFiled: December 9, 2020Date of Patent: May 16, 2023Assignee: International Business Machines CorporationInventors: Alexandra Shulman-Peleg, Shmuel Regev, Ron Peleg, Shahar Kohanim, Zohar Basil
-
Publication number: 20210120045Abstract: A security manager configured to generate a plurality of learned security policies and provide at least one learned security policy and a security agent to a client machine for enforcement of the at least one learned security policy by the security agent on the client machine. The security manager configured to receive alerts from the security agent indicating anomalous behavior on the client machine.Type: ApplicationFiled: December 9, 2020Publication date: April 22, 2021Inventors: Alexandra Shulman-Peleg, Shmuel Regev, Ron Peleg, Shahar Kohanim, Zohar Basil
-
Patent number: 10965717Abstract: A security manager configured to generate a plurality of learned security policies and provide at least one learned security policy and a security agent to a client machine for enforcement of the at least one learned security policy by the security agent on the client machine. The security manager configured to receive alerts from the security agent indicating anomalous behavior on the client machine.Type: GrantFiled: November 6, 2019Date of Patent: March 30, 2021Assignee: International Business Machines CorporationInventors: Alexandra Shulman-Peleg, Shmuel Regev, Ron Peleg, Shahar Kohanim, Zohar Basil
-
Patent number: 10691475Abstract: Hypervisors and guest operating systems/virtual machines communicate in virtual environments to enable applications and other services. Security measures are a concern in implementing a secure environment. One feature may include at least one of identifying a session initiation request from a guest operation system at a hypervisor component of a server and receiving periodic messages from the guest operating system, and establishing and maintaining a session and connection between the hypervisor and the guest operating system responsive to receiving the periodic messages from the guest operating system.Type: GrantFiled: August 14, 2018Date of Patent: June 23, 2020Assignee: International Business Machines CorporationInventors: Shai Barlev, Shahar Kohanim, Shmulik Regev
-
Publication number: 20200076861Abstract: A security manager configured to generate a plurality of learned security policies and provide at least one learned security policy and a security agent to a client machine for enforcement of the at least one learned security policy by the security agent on the client machine. The security manager configured to receive alerts from the security agent indicating anomalous behavior on the client machine.Type: ApplicationFiled: November 6, 2019Publication date: March 5, 2020Inventors: Alexandra Shulman-Peleg, Shmuel Regev, Ron Peleg, Shahar Kohanim, Zohar Basil
-
Patent number: 10560487Abstract: A security manager configured to generate a plurality of learned security policies and provide at least one learned security policy and a security agent to a client machine for enforcement of the at least one learned security policy by the security agent on the client machine. The security manager configured to receive alerts from the security agent indicating anomalous behavior on the client machine.Type: GrantFiled: July 26, 2017Date of Patent: February 11, 2020Assignee: International Business Machines CorporationInventors: Alexandra Shulman-Peleg, Shmuel Regev, Ron Peleg, Shahar Kohanim, Zohar Basil
-
Publication number: 20190036978Abstract: A security manager configured to generate a plurality of learned security policies and provide at least one learned security policy and a security agent to a client machine for enforcement of the at least one learned security policy by the security agent on the client machine. The security manager configured to receive alerts from the security agent indicating anomalous behavior on the client machine.Type: ApplicationFiled: July 26, 2017Publication date: January 31, 2019Inventors: Alexandra Shulman-Peleg, Shmuel Regev, Ron Peleg, Shahar Kohanim, Zohar Basil
-
Publication number: 20190004833Abstract: Hypervisors and guest operating systems/virtual machines communicate in virtual environments to enable applications and other services. Security measures are a concern in implementing a secure environment. One feature may include at least one of identifying a session initiation request from a guest operation system at a hypervisor component of a server and receiving periodic messages from the guest operating system, and establishing and maintaining a session and connection between the hypervisor and the guest operating system responsive to receiving the periodic messages from the guest operating system.Type: ApplicationFiled: August 14, 2018Publication date: January 3, 2019Inventors: Shai Barlev, Shahar Kohanim, Shmulik Regev
-
Patent number: 10089124Abstract: Hypervisors and guest operating systems/virtual machines communicate in virtual environments to enable applications and other services. Security measures are a concern in implementing a secure environment. One feature may include at least one of identifying a session initiation request from a guest operation system at a hypervisor component of a server and receiving periodic messages from the guest operating system, and establishing and maintaining a session and connection between the hypervisor and the guest operating system responsive to receiving the periodic messages from the guest operating system.Type: GrantFiled: December 31, 2015Date of Patent: October 2, 2018Assignee: International Business Machines CorporationInventors: Shai Barlev, Shahar Kohanim, Shmulik Regev
-
Patent number: 9985865Abstract: Evaluating communications via a computer network for the presence of proxy-based communications, by sending to a computer via a computer network multiple data packets followed by an out-of-sequence data packet that is out-of-sequence relative to any of the multiple data packets, receipt of the out-of-sequence data packet configured to cause the computer to send an acknowledgement via the computer network, and to cause the requestor to send a second data request via the computer and the computer network, detecting receipt of the acknowledgement at a first time, detecting receipt of the second data request at a second time, calculating a time delay between the first time and the second time, performing the sending, detecting and calculating steps multiple times for calculating multiple time delays, and determining whether the requestor is communicating via a proxy by evaluating the multiple time delays with respect to a predefined proxy evaluation criterion.Type: GrantFiled: November 23, 2015Date of Patent: May 29, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yossi Gilad, Shahar Kohanim
-
Patent number: 9954759Abstract: Evaluating communications via a computer network for the presence of proxy-based communications, by sending to a computer via a computer network multiple data packets followed by an out-of-sequence data packet that is out-of-sequence relative to any of the multiple data packets, receipt of the out-of-sequence data packet configured to cause the computer to send an acknowledgement via the computer network, and to cause the requestor to send a second data request via the computer and the computer network, detecting receipt of the acknowledgement at a first time, detecting receipt of the second data request at a second time, calculating a time delay between the first time and the second time, performing the sending, detecting and calculating steps multiple times for calculating multiple time delays, and determining whether the requestor is communicating via a proxy by evaluating the multiple time delays with respect to a predefined proxy evaluation criterion.Type: GrantFiled: July 29, 2015Date of Patent: April 24, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yossi Gilad, Shahar Kohanim
-
Patent number: 9785790Abstract: Protecting a computer security application by executing the computer security application on a computer in a first namespace associated with an operating system of the computer, and creating a second namespace associated with the operating system of the computer, where the second namespace is accessible to the computer security application, and where the first namespace is inaccessible from the second namespace.Type: GrantFiled: December 15, 2015Date of Patent: October 10, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shmuel Regev, Shahar Kohanim, Shai Barlev
-
Publication number: 20170192801Abstract: Hypervisors and guest operating systems/virtual machines communicate in virtual environments to enable applications and other services. Security measures are a concern in implementing a secure environment. One feature may include at least one of identifying a session initiation request from a guest operation system at a hypervisor component of a server and receiving periodic messages from the guest operating system, and establishing and maintaining a session and connection between the hypervisor and the guest operating system responsive to receiving the periodic messages from the guest operating system.Type: ApplicationFiled: December 31, 2015Publication date: July 6, 2017Inventors: Shai Barlev, Shahar Kohanim, Shmulik Regev
-
Publication number: 20170169238Abstract: Protecting a computer security application by executing the computer security application on a computer in a first namespace associated with an operating system of the computer, and creating a second namespace associated with the operating system of the computer, where the second namespace is accessible to the computer security application, and where the first namespace is inaccessible from the second namespace.Type: ApplicationFiled: December 15, 2015Publication date: June 15, 2017Inventors: SHMUEL REGEV, SHAHAR KOHANIM, SHAI BARLEV
-
Publication number: 20170034037Abstract: Evaluating communications via a computer network for the presence of proxy-based communications, by sending to a computer via a computer network multiple data packets followed by an out-of-sequence data packet that is out-of-sequence relative to any of the multiple data packets, receipt of the out-of-sequence data packet configured to cause the computer to send an acknowledgement via the computer network, and to cause the requestor to send a second data request via the computer and the computer network, detecting receipt of the acknowledgement at a first time, detecting receipt of the second data request at a second time, calculating a time delay between the first time and the second time, performing the sending, detecting and calculating steps multiple times for calculating multiple time delays, and determining whether the requestor is communicating via a proxy by evaluating the multiple time delays with respect to a predefined proxy evaluation criterion.Type: ApplicationFiled: July 29, 2015Publication date: February 2, 2017Inventors: YOSSI GILAD, SHAHAR KOHANIM
-
Publication number: 20170034029Abstract: Evaluating communications via a computer network for the presence of proxy-based communications, by sending to a computer via a computer network multiple data packets followed by an out-of-sequence data packet that is out-of-sequence relative to any of the multiple data packets, receipt of the out-of-sequence data packet configured to cause the computer to send an acknowledgement via the computer network, and to cause the requestor to send a second data request via the computer and the computer network, detecting receipt of the acknowledgement at a first time, detecting receipt of the second data request at a second time, calculating a time delay between the first time and the second time, performing the sending, detecting and calculating steps multiple times for calculating multiple time delays, and determining whether the requestor is communicating via a proxy by evaluating the multiple time delays with respect to a predefined proxy evaluation criterion.Type: ApplicationFiled: November 23, 2015Publication date: February 2, 2017Inventors: YOSSI GILAD, SHAHAR KOHANIM