Patents by Inventor Tomer Bitton

Tomer Bitton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240411865
    Abstract: Methods, systems, and techniques for preventing and deterring unauthorized capture of analog data are provided. Example embodiments provide a Analog Data Loss Prevention System (“ADLPS”), which enables enterprise/company administrators to monitor access to analog data and to define and enforce customizable policies based upon defined risk profiles. The ADLPS platform is designed to identify violations of the “analog loophole” in organizations' data protection policies and to detect an accidental disclosure of confidential information, enabling enterprises to take appropriate steps for preventing data loss. In one example embodiment, the ADLPS comprises one or more ADLPS agents executing on each monitored endpoint device, one or more ADLPS agent backends, one or more ADLPS administrator user interfaces and backends, one or more databases, and one or more file storage devices/mechanisms.
    Type: Application
    Filed: June 9, 2023
    Publication date: December 12, 2024
    Applicant: Defy Photo Shield, LLC
    Inventors: Tomer Bitton, Jonathan Loew, Neil Shroff, Mark Schlesinger, Daniel Goland
  • Patent number: 11244051
    Abstract: A computer implemented method for protecting data stored in at least one file from being overwritten by malicious code, comprises: monitoring at least one file stored in a storage device location to detect a request to perform an overwrite operation at least a portion of data of the at least one file; redirecting the overwrite operation to a memory location designated as safe for being overwritten; analyzing the overwrite operation at the memory location to identify an association with malicious code; and outputting an indication of an attempt to overwrite the at least one file by malicious code.
    Type: Grant
    Filed: December 11, 2017
    Date of Patent: February 8, 2022
    Assignee: Fortinet, Inc.
    Inventors: Udi Yavo, Tomer Bitton, Ido Kelson, Gregory Messerman
  • Publication number: 20190347415
    Abstract: A computer implemented method for protecting data stored in at least one file from being overwritten by malicious code, comprises: monitoring at least one file stored in a storage device location to detect a request to perform an overwrite operation at least a portion of data of the at least one file; redirecting the overwrite operation to a memory location designated as safe for being overwritten; analyzing the overwrite operation at the memory location to identify an association with malicious code; and outputting an indication of an attempt to overwrite the at least one file by malicious code.
    Type: Application
    Filed: December 11, 2017
    Publication date: November 14, 2019
    Applicant: enSilo Ltd.
    Inventors: Udi YAVO, Tomer BITTON, Ido KELSON, Gregory MESSERMAN
  • Patent number: 10334083
    Abstract: There is provided a computer implemented method for detection and prevention of an attempt at establishment of a network connection for malicious communication, comprising: detecting a connection establishment process for establishing a network connection, the connection establishment process initiated by code running on a client terminal; analyzing records in at least one stack trace of the initiating code managed at the client terminal, to detect a trial to establish a malicious communication wherein the network connection is used for malicious activity; and blocking establishment of the network connection when the analysis detects the trial to establish the malicious communication based on the network connection.
    Type: Grant
    Filed: November 24, 2015
    Date of Patent: June 25, 2019
    Assignee: enSilo Ltd.
    Inventors: Roy Katmor, Tomer Bitton, Udi Yavo, Ido Kelson
  • Patent number: 10264104
    Abstract: There is provided a method for authenticating an attempt at establishment of a network connection by allowed code, comprising: providing a dataset having previously observed stack trace templates each representing a stack trace pattern prevailing in stack traces recorded by monitoring stacks of clients executing an allowed code during a connection establishment process for establishing network connections related to the allowed code; receiving a new stack trace recorded during a new connection establishment process for a new network connection by a new client; measuring a similarity between the new stack trace and the plurality of stack trace templates to identify a match to a stack trace template; evaluating the matched stack trace template for a predefined rule requirement; and updating a rule-set database with the matched stack trace template to authenticate new network connection establishments associated with stack templates matching the matched stack trace template.
    Type: Grant
    Filed: April 23, 2018
    Date of Patent: April 16, 2019
    Assignee: enSilo Ltd.
    Inventors: Roy Katmor, Tomer Bitton, Udi Yavo, Ido Kelson
  • Publication number: 20180241853
    Abstract: There is provided a method for authenticating an attempt at establishment of a network connection by allowed code, comprising: providing a dataset having previously observed stack trace templates each representing a stack trace pattern prevailing in stack traces recorded by monitoring stacks of clients executing an allowed code during a connection establishment process for establishing network connections related to the allowed code; receiving a new stack trace recorded during a new connection establishment process for a new network connection by a new client; measuring a similarity between the new stack trace and the plurality of stack trace templates to identify a match to a stack trace template; evaluating the matched stack trace template for a predefined rule requirement; and updating a rule-set database with the matched stack trace template to authenticate new network connection establishments associated with stack templates matching the matched stack trace template.
    Type: Application
    Filed: April 23, 2018
    Publication date: August 23, 2018
    Applicant: enSilo Ltd.
    Inventors: Roy KATMOR, Tomer BITTON, Udi YAVO, Ido KELSON
  • Patent number: 9954980
    Abstract: There is provided a method for authenticating an attempt at establishment of a network connection by allowed code, comprising: providing a dataset having previously observed stack trace templates each representing a stack trace pattern prevailing in stack traces recorded by monitoring stacks of clients executing an allowed code during a connection establishment process for establishing network connections related to the allowed code; receiving a new stack trace recorded during a new connection establishment process for a new network connection by a new client; measuring a similarity between the new stack trace and the plurality of stack trace templates to identify a match to a stack trace template; evaluating the matched stack trace template for a predefined rule requirement; and updating a rule-set database with the matched stack trace template to authenticate new network connection establishments associated with stack templates matching the matched stack trace template.
    Type: Grant
    Filed: November 24, 2015
    Date of Patent: April 24, 2018
    Assignee: enSilo Ltd.
    Inventors: Roy Katmor, Tomer Bitton, Udi Yavo, Ido Kelson
  • Publication number: 20160149937
    Abstract: There is provided a computer implemented method for detection and prevention of an attempt at establishment of a network connection for malicious communication, comprising: detecting a connection establishment process for establishing a network connection, the connection establishment process initiated by code running on a client terminal; analyzing records in at least one stack trace of the initiating code managed at the client terminal, to detect a trial to establish a malicious communication wherein the network connection is used for malicious activity; and blocking establishment of the network connection when the analysis detects the trial to establish the malicious communication based on the network connection.
    Type: Application
    Filed: November 24, 2015
    Publication date: May 26, 2016
    Inventors: Roy KATMOR, Tomer BITTON, Udi YAVO, Ido KELSON
  • Publication number: 20160149887
    Abstract: There is provided a method for authenticating an attempt at establishment of a network connection by allowed code, comprising: providing a dataset having previously observed stack trace templates each representing a stack trace pattern prevailing in stack traces recorded by monitoring stacks of clients executing an allowed code during a connection establishment process for establishing network connections related to the allowed code; receiving a new stack trace recorded during a new connection establishment process for a new network connection by a new client; measuring a similarity between the new stack trace and the plurality of stack trace templates to identify a match to a stack trace template; evaluating the matched stack trace template for a predefined rule requirement; and updating a rule-set database with the matched stack trace template to authenticate new network connection establishments associated with stack templates matching the matched stack trace template.
    Type: Application
    Filed: November 24, 2015
    Publication date: May 26, 2016
    Inventors: Roy KATMOR, Tomer BITTON, Udi YAVO, Ido KELSON
  • Patent number: 8869279
    Abstract: The detection of web browser-based attacks using browser test launched from a remote source is described. In one example, it is determined that a test should be performed responsive to receiving an HTTP message sent by a client device and a policy. The test is performed with the client device to determine only whether content intended to be communicated between the HTTP client and the web application server using an HTTP message has been modified by malware on the HTTP client. The test includes the sending of an HTTP response to the HTTP client. The results of the test are analyzed and defensive measures are taken.
    Type: Grant
    Filed: March 23, 2012
    Date of Patent: October 21, 2014
    Assignee: Imperva, Inc.
    Inventors: Amichai Shulman, Tal Arieh Be'ery, Tomer Bitton
  • Publication number: 20130329183
    Abstract: Some embodiments of the present invention provide an adapter including one or more electronic components contained within a housing for attachment to eyewear. The housing may include a main body extending in a lengthwise direction, the main body having a front section and a rear section defining opposite ends thereof and a middle section disposed between and connecting the front section and the rear section, and an attachment portion protruding from the main body in a widthwise direction, the attachment portion configured to connect to a portion of a temple of an eyewear frame, wherein a width of the main body decreases from the middle section toward a front end of the front section.
    Type: Application
    Filed: June 7, 2013
    Publication date: December 12, 2013
    Applicant: PixelOptics, Inc.
    Inventors: Ronald D. BLUM, Tomer BITTON, Richard CLOMPUS, Mark GRAHAM, William KOKONASKI
  • Publication number: 20120304296
    Abstract: The detection of web browser-based attacks using browser test launched from a remote source is described. In one example, it is determined that a test should be performed responsive to receiving an HTTP message sent by a client device and a policy. The test is performed with the client device to determine only whether content intended to be communicated between the HTTP client and the web application server using an HTTP message has been modified by malware on the HTTP client. The test includes the sending of an HTTP response to the HTTP client. The results of the test are analyzed and defensive measures are taken.
    Type: Application
    Filed: March 23, 2012
    Publication date: November 29, 2012
    Inventors: Amichai Shulman, Tal Arieh Be'ery, Tomer Bitton
  • Patent number: D745084
    Type: Grant
    Filed: July 18, 2013
    Date of Patent: December 8, 2015
    Assignee: Mitsui Chemicals, Inc.
    Inventors: Ronald D. Blum, Tomer Bitton
  • Patent number: D755281
    Type: Grant
    Filed: July 18, 2013
    Date of Patent: May 3, 2016
    Assignee: Mitsui Chemicals, Inc.
    Inventors: Ronald D. Blum, Tomer Bitton