Patents by Inventor Tal Moran

Tal Moran has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7774835
    Abstract: A method and computer program for automatically and continually extracting application protocols (i.e., defining a set of allowable or authorized actions) for any application. The method involves receiving a message from a server before it is sent or in parallel with sending to a client. The message may be in response to a specific request for it from the client. The program then extracts the application protocol data from the server message. Working with a copy of the message, the program strips off the communications protocol(s) from the message and parses the remaining message to identify user-selectable options contained in the message such as commands, fields, etc. These items represent the set of allowable or authorized user actions for the particular “stage” of the current version of the application as set forth in the message. The set of allowable user actions is then stored by the extraction program in a protocol database accessible to a gateway or filter module.
    Type: Grant
    Filed: August 2, 2004
    Date of Patent: August 10, 2010
    Assignee: F5 Networks, Inc.
    Inventors: Gil Raanan, Tal Moran, Yaron Galant, Yuval El-Hanani, Eran Reshef
  • Patent number: 7703127
    Abstract: A system and method are presented for authorizing execution of requested actions transmitted between clients and servers of a data processing system. The method includes receiving a message including a set of actions and simulating execution of the set of actions. A list representing allowable actions and user-definable inputs to the simulated actions is defined. The list of allowable actions and user-definable inputs to the allowable action is then compared to user-requested actions and inputs. When elements within the user-requested actions and inputs are included in the allowable actions and input list, the user-requested actions and inputs are authorized for execution.
    Type: Grant
    Filed: October 17, 2007
    Date of Patent: April 20, 2010
    Assignee: International Business Machines Corporation
    Inventors: Tal Moran, Yuval El-Hanani, Eran Reshef, Gil Zoran
  • Publication number: 20080066173
    Abstract: A system and method are presented for authorizing execution of requested actions transmitted between clients and servers of a data processing system. The method includes receiving a message including a set of actions and simulating execution of the set of actions. A list representing allowable actions and user-definable inputs to the simulated actions is defined. The list of allowable actions and user-definable inputs to the allowable action is then compared to user-requested actions and inputs. When elements within the user-requested actions and inputs are included in the allowable actions and input list, the user-requested actions and inputs are authorized for execution.
    Type: Application
    Filed: October 17, 2007
    Publication date: March 13, 2008
    Applicant: WATCHFIRE CORPORATION
    Inventors: Tal MORAN, Yuval EL-HANANI, Gil RAANAN, Eran RESHEF
  • Patent number: 7293281
    Abstract: A system and method are presented for authorizing execution of requested actions transmitted between clients and servers of a data processing system. The method includes receiving a message including a set of actions and simulating execution of the set of actions. A list representing allowable actions and user-definable inputs to the simulated actions is defined. The list of allowable actions and user-definable inputs to the allowable action is then compared to user-requested actions and inputs. When elements within the user-requested actions and inputs are included in the allowable actions and input list, the user-requested actions and inputs are authorized for execution.
    Type: Grant
    Filed: October 25, 2000
    Date of Patent: November 6, 2007
    Assignee: Watchfire Corporation
    Inventors: Tal Moran, Yuval El-Hanani, Gil Raanan, Eran Reshef
  • Publication number: 20050044420
    Abstract: A method and computer program for automatically and continually extracting application protocols (i.e., defining a set of allowable or authorized actions) for any application. The method involves receiving a message from a server before it is sent or in parallel with sending to a client. The message may be in response to a specific request for it from the client. The program then extracts the application protocol data from the server message. Working with a copy of the message, the program strips off the communications protocol(s) from the message and parses the remaining message to identify user-selectable options contained in the message such as commands, fields, etc. These items represent the set of allowable or authorized user actions for the particular “stage” of the current version of the application as set forth in the message. The set of allowable user actions is then stored by the extraction program in a protocol database accessible to a gateway or filter module.
    Type: Application
    Filed: August 2, 2004
    Publication date: February 24, 2005
    Inventors: Gil Raanan, Tal Moran, Yaron Galant, Yuval El-Hanani, Eran Reshef
  • Publication number: 20020116643
    Abstract: A method and computer program for automatically and continually extracting application protocols (i.e., defining a set of allowable or authorized actions) for any application. The method involves receiving a message from a server before it is sent or in parallel with sending to a client. The message may be in response to a specific request for it from the client. The program then extracts the application protocol data from the server message. Working with a copy of the message, the program strips off the communications protocol(s) from the message and parses the remaining message to identify user-selectable options contained in the message such as commands, fields, etc. These items represent the set of allowable or authorized user actions for the particular “stage” of the current version of the application as set forth in the message. The set of allowable user actions is then stored by the extraction program in a protocol database accessible to a gateway or filter module.
    Type: Application
    Filed: September 14, 2001
    Publication date: August 22, 2002
    Inventors: Gil Raanan, Tal Moran, Yaroa Galant, Yuval El-Hanani, Eran Reshef
  • Patent number: 6311278
    Abstract: A method and computer program for automatically and continually extracting application protocols (i.e., defining a set of allowable or authorized actions) for any application. The method involves receiving a message from a server before it is sent or in parallel with sending to a client. The message may be in response to a specific request for it from the client. The program then extracts the application protocol data from the server message. Working with a copy of the message, the program strips off the communications protocol(s) from the message and parses the remaining message to identify user-selectable options contained in the message such as commands, fields, etc. These items represent the set of allowable or authorized user actions for the particular “stage” of the current version of the application as set forth in the message. The set of allowable user actions is then stored by the extraction program in a protocol database accessible to a gateway or filter module.
    Type: Grant
    Filed: July 1, 1999
    Date of Patent: October 30, 2001
    Assignee: Sanctum Ltd.
    Inventors: Gil Raanan, Tal Moran, Yoron Galant, Yuval El-Hanani, Eran Reshef