Patents by Inventor Tamir Zegman

Tamir Zegman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11550934
    Abstract: A method is provided for identifying improperly redacted information in documents. The documents are analyzed to detect redacted areas and text elements and to identify an intersection between a redacted area and a text element. When an area of the intersection is greater than an intersection threshold, the document is identified as containing improperly redacted information.
    Type: Grant
    Filed: March 16, 2021
    Date of Patent: January 10, 2023
    Assignee: CHECK POINT SOFTWARE TECHNOLOGIES, LTD.
    Inventor: Tamir Zegman
  • Publication number: 20220300621
    Abstract: A method is provided for identifying improperly redacted information in documents. The documents are analyzed to detect redacted areas and text elements and to identify an intersection between a redacted area and a text element. When an area of the intersection is greater than an intersection threshold, the document is identified as containing improperly redacted information.
    Type: Application
    Filed: March 16, 2021
    Publication date: September 22, 2022
    Inventor: Tamir Zegman
  • Patent number: 11411924
    Abstract: Methods and systems for processing cryptographically secured connections by a gateway, between a client and a server, are performed. Upon receiving TCP and TLS/SSL handshakes associated with a client side connection, from a client (client computer) to the gateway, a probing connection is established. The probing connection completes the handshakes, and based on the completion of the handshakes, the gateway renders a decision, to bypass, block or inspect, the connections between the client and the server, allowing or not allowing data to pass through the connections between the client and the server.
    Type: Grant
    Filed: December 20, 2018
    Date of Patent: August 9, 2022
    Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Pavel Isaev, Idan Sayag, Alexey Volodin, Tamir Zegman
  • Publication number: 20200204519
    Abstract: Methods and systems for processing cryptographically secured connections by a gateway, between a client and a server, are performed. Upon receiving TCP and TLS/SSL handshakes associated with a client side connection, from a client (client computer) to the gateway, a probing connection is established. The probing connection completes the handshakes, and based on the completion of the handshakes, the gateway renders a decision, to bypass, block or inspect, the connections between the client and the server, allowing or not allowing data to pass through the connections between the client and the server.
    Type: Application
    Filed: December 20, 2018
    Publication date: June 25, 2020
    Inventors: Pavel ISAEV, Idan SAYAG, Alexey VOLODIN, Tamir ZEGMAN
  • Publication number: 20200177566
    Abstract: The present invention is a computer system, such cooperator is coupled to a negotiator, which is associated with one of the peers, a client (client computer) or server (e.g., a computer), to a Transport Layer Security (TLS)/Secure Socket Layer (SSL) session and its associated handshake between the peers. The cooperator is configured such that it can obtain parts of the handshake between peers, without taking part in the handshake.
    Type: Application
    Filed: November 29, 2018
    Publication date: June 4, 2020
    Inventors: Nir NAAMAN, Guy OFFER, Tamir ZEGMAN
  • Patent number: 10567395
    Abstract: Methods and systems for the detection of receipt of potentially malicious web content by a web clients are disclosed. These methods and systems comprise elements of hardware and software for obtaining a sandbox environment on a server, wherein the sandbox is configured according to the system characteristics of the client device, emulating web requests and responses of the web client in the sandbox; and analyzing the behavior of components in the sandbox during processing of received web content.
    Type: Grant
    Filed: May 10, 2015
    Date of Patent: February 18, 2020
    Assignee: Check Point Advanced Threat Prevention Ltd
    Inventors: Aviv Gafni, Ben Omelchenko, Tamir Zegman
  • Patent number: 9686294
    Abstract: Methods and systems for protecting components of a linked vehicle from cyber-attack are disclosed. These methods and systems comprise elements of hardware and software for receiving a packet; tunneling the packet to a terrestrial-based security service, analyzing whether the packet is harmful to a component in the vehicle, and at least one action to protect at least one component.
    Type: Grant
    Filed: June 15, 2015
    Date of Patent: June 20, 2017
    Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Alon Kantor, Tamir Zegman
  • Patent number: 9661006
    Abstract: Methods and systems for mitigating cyber attacks on components of an automotive communication system are disclosed. These methods and systems comprise elements of hardware and software for receiving a frame; determining whether the frame potentially affects correct operation of an automotive component; and, taking protective action.
    Type: Grant
    Filed: March 31, 2015
    Date of Patent: May 23, 2017
    Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Alon Kantor, Tamir Zegman
  • Patent number: 9647985
    Abstract: A network component has a set of one or more rules, each of which has a match component and an action component. If an incoming packet maps to the match component of a rule, then the packet is handled according to the rule's action component. If the rule also includes a limit component, then if the packet maps to the rule's match component, a family history of the rule is updated, and the packet is handled according to the rule's action component only if the rule's family history satisfies the rule's limit component.
    Type: Grant
    Filed: May 23, 2013
    Date of Patent: May 9, 2017
    Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD
    Inventors: Tamir Zegman, Ofer Barkai
  • Publication number: 20160366156
    Abstract: Methods and systems for protecting components of a linked vehicle from cyber-attack are disclosed. These methods and systems comprise elements of hardware and software for receiving a packet; tunneling the packet to a terrestrial-based security service, analyzing whether the packet is harmful to a component in the vehicle, and at least one action to protect at least one component.
    Type: Application
    Filed: June 15, 2015
    Publication date: December 15, 2016
    Inventors: Alon KANTOR, Tamir Zegman
  • Publication number: 20160330215
    Abstract: Methods and systems for the detection of receipt of potentially malicious web content by a web clients are disclosed. These methods and systems comprise elements of hardware and software for obtaining a sandbox environment on a server, wherein the sandbox is configured according to the system characteristics of the client device, emulating web requests and responses of the web client in the sandbox; and analyzing the behavior of components in the sandbox during processing of received web content.
    Type: Application
    Filed: May 10, 2015
    Publication date: November 10, 2016
    Inventors: Aviv GAFNI, Ben OMELCHENKO, Tamir ZEGMAN
  • Publication number: 20160294848
    Abstract: Methods and systems for mitigating cyber attacks on components of an automotive communication system are disclosed. These methods and systems comprise elements of hardware and software for receiving a frame; determining whether the frame potentially affects correct operation of an automotive component; and, taking protective action.
    Type: Application
    Filed: March 31, 2015
    Publication date: October 6, 2016
    Inventors: Alon KANTOR, Tamir ZEGMAN
  • Publication number: 20140351878
    Abstract: A network component has a set of one or more rules, each of which has a match component and an action component. If an incoming packet maps to the match component of a rule, then the packet is handled according to the rule's action component. If the rule also includes a limit component, then if the packet maps to the rule's match component, a family history of the rule is updated, and the packet is handled according to the rule's action component only if the rule's family history satisfies the rule's limit component.
    Type: Application
    Filed: May 23, 2013
    Publication date: November 27, 2014
    Applicant: Check Point Software Technologies Ltd.
    Inventors: Tamir Zegman, Ofer Barkai
  • Patent number: 8844019
    Abstract: A security gateway of a computer network receives incoming packets at one or more network interfaces. One or more security functions are applied to the packets. Reports of security function violations are recorded. The reports include the source addresses of the packets, the times that the packets were received, and descriptions of the violations. The descriptions include weights, and if the sum of the weights, for packets of a common source address that are received within a first time interval, exceeds a threshold, subsequent packets from that source address are dropped. Alternatively, in a “monitor only” mode, the common source address is logged but packets are not dropped. Optionally, encrypted packets and/or packets received at some network interfaces but not at other network interfaces are not dropped.
    Type: Grant
    Filed: November 21, 2012
    Date of Patent: September 23, 2014
    Assignee: Check Point Software Technologies Ltd.
    Inventors: Ofer Barkai, Dorit Dor, Tamir Zegman
  • Publication number: 20140143850
    Abstract: A security gateway of a computer network receives incoming packets at one or more network interfaces. One or more security functions are applied to the packets. Reports of security function violations are recorded. The reports include the source addresses of the packets, the times that the packets were received, and descriptions of the violations. The descriptions include weights, and if the sum of the weights, for packets of a common source address that are received within a first time interval, exceeds a threshold, subsequent packets from that source address are dropped. Alternatively, in a “monitor only” mode, the common source address is logged but packets are not dropped. Optionally, encrypted packets and/or packets received at some network interfaces but not at other network interfaces are not dropped.
    Type: Application
    Filed: November 21, 2012
    Publication date: May 22, 2014
    Applicant: Check Point Software Technologies Ltd.
    Inventors: Ofer Barkai, Dorit Dor, Tamir Zegman
  • Patent number: 7930744
    Abstract: The present invention discloses methods and media for hooking applications to monitor and prevent execution of security-sensitive operations, the method including the steps of: reading at least one configuration parameter list from a configuration module; hooking, by a hooking engine, a hooking point in an application, wherein the hooking point is defined in the configuration module; calling, by the application, the hooking point during operation of the application; matching at least one hooking parameter in the hooking point to at least one configuration parameter in at least one configuration parameter list; and upon detecting a match between the hooking parameter and at least one configuration parameter, performing at least one configuration-defined action. Preferably, the method further includes the step of: updating a state of the hooking engine. Preferably, the hooking engine is operative to prevent malicious operations by obfuscated code.
    Type: Grant
    Filed: July 2, 2008
    Date of Patent: April 19, 2011
    Assignee: Check Point Software Technologies Ltd.
    Inventors: Tomer Teller, Idan Nahoum, Tamir Zegman
  • Publication number: 20100005528
    Abstract: The present invention discloses methods and media for hooking applications to monitor and prevent execution of security-sensitive operations, the method including the steps of: reading at least one configuration parameter list from a configuration module; hooking, by a hooking engine, a hooking point in an application, wherein the hooking point is defined in the configuration module; calling, by the application, the hooking point during operation of the application; matching at least one hooking parameter in the hooking point to at least one configuration parameter in at least one configuration parameter list; and upon detecting a match between the hooking parameter and at least one configuration parameter, performing at least one configuration-defined action. Preferably, the method further includes the step of: updating a state of the hooking engine. Preferably, the hooking engine is operative to prevent malicious operations by obfuscated code.
    Type: Application
    Filed: July 2, 2008
    Publication date: January 7, 2010
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES, LTD.
    Inventors: Tomer Teller, Idan Nahoum, Tamir Zegman