Patents by Inventor Tomer Bitton
Tomer Bitton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240411865Abstract: Methods, systems, and techniques for preventing and deterring unauthorized capture of analog data are provided. Example embodiments provide a Analog Data Loss Prevention System (“ADLPS”), which enables enterprise/company administrators to monitor access to analog data and to define and enforce customizable policies based upon defined risk profiles. The ADLPS platform is designed to identify violations of the “analog loophole” in organizations' data protection policies and to detect an accidental disclosure of confidential information, enabling enterprises to take appropriate steps for preventing data loss. In one example embodiment, the ADLPS comprises one or more ADLPS agents executing on each monitored endpoint device, one or more ADLPS agent backends, one or more ADLPS administrator user interfaces and backends, one or more databases, and one or more file storage devices/mechanisms.Type: ApplicationFiled: June 9, 2023Publication date: December 12, 2024Applicant: Defy Photo Shield, LLCInventors: Tomer Bitton, Jonathan Loew, Neil Shroff, Mark Schlesinger, Daniel Goland
-
Patent number: 11244051Abstract: A computer implemented method for protecting data stored in at least one file from being overwritten by malicious code, comprises: monitoring at least one file stored in a storage device location to detect a request to perform an overwrite operation at least a portion of data of the at least one file; redirecting the overwrite operation to a memory location designated as safe for being overwritten; analyzing the overwrite operation at the memory location to identify an association with malicious code; and outputting an indication of an attempt to overwrite the at least one file by malicious code.Type: GrantFiled: December 11, 2017Date of Patent: February 8, 2022Assignee: Fortinet, Inc.Inventors: Udi Yavo, Tomer Bitton, Ido Kelson, Gregory Messerman
-
Publication number: 20190347415Abstract: A computer implemented method for protecting data stored in at least one file from being overwritten by malicious code, comprises: monitoring at least one file stored in a storage device location to detect a request to perform an overwrite operation at least a portion of data of the at least one file; redirecting the overwrite operation to a memory location designated as safe for being overwritten; analyzing the overwrite operation at the memory location to identify an association with malicious code; and outputting an indication of an attempt to overwrite the at least one file by malicious code.Type: ApplicationFiled: December 11, 2017Publication date: November 14, 2019Applicant: enSilo Ltd.Inventors: Udi YAVO, Tomer BITTON, Ido KELSON, Gregory MESSERMAN
-
Patent number: 10334083Abstract: There is provided a computer implemented method for detection and prevention of an attempt at establishment of a network connection for malicious communication, comprising: detecting a connection establishment process for establishing a network connection, the connection establishment process initiated by code running on a client terminal; analyzing records in at least one stack trace of the initiating code managed at the client terminal, to detect a trial to establish a malicious communication wherein the network connection is used for malicious activity; and blocking establishment of the network connection when the analysis detects the trial to establish the malicious communication based on the network connection.Type: GrantFiled: November 24, 2015Date of Patent: June 25, 2019Assignee: enSilo Ltd.Inventors: Roy Katmor, Tomer Bitton, Udi Yavo, Ido Kelson
-
Patent number: 10264104Abstract: There is provided a method for authenticating an attempt at establishment of a network connection by allowed code, comprising: providing a dataset having previously observed stack trace templates each representing a stack trace pattern prevailing in stack traces recorded by monitoring stacks of clients executing an allowed code during a connection establishment process for establishing network connections related to the allowed code; receiving a new stack trace recorded during a new connection establishment process for a new network connection by a new client; measuring a similarity between the new stack trace and the plurality of stack trace templates to identify a match to a stack trace template; evaluating the matched stack trace template for a predefined rule requirement; and updating a rule-set database with the matched stack trace template to authenticate new network connection establishments associated with stack templates matching the matched stack trace template.Type: GrantFiled: April 23, 2018Date of Patent: April 16, 2019Assignee: enSilo Ltd.Inventors: Roy Katmor, Tomer Bitton, Udi Yavo, Ido Kelson
-
Publication number: 20180241853Abstract: There is provided a method for authenticating an attempt at establishment of a network connection by allowed code, comprising: providing a dataset having previously observed stack trace templates each representing a stack trace pattern prevailing in stack traces recorded by monitoring stacks of clients executing an allowed code during a connection establishment process for establishing network connections related to the allowed code; receiving a new stack trace recorded during a new connection establishment process for a new network connection by a new client; measuring a similarity between the new stack trace and the plurality of stack trace templates to identify a match to a stack trace template; evaluating the matched stack trace template for a predefined rule requirement; and updating a rule-set database with the matched stack trace template to authenticate new network connection establishments associated with stack templates matching the matched stack trace template.Type: ApplicationFiled: April 23, 2018Publication date: August 23, 2018Applicant: enSilo Ltd.Inventors: Roy KATMOR, Tomer BITTON, Udi YAVO, Ido KELSON
-
Patent number: 9954980Abstract: There is provided a method for authenticating an attempt at establishment of a network connection by allowed code, comprising: providing a dataset having previously observed stack trace templates each representing a stack trace pattern prevailing in stack traces recorded by monitoring stacks of clients executing an allowed code during a connection establishment process for establishing network connections related to the allowed code; receiving a new stack trace recorded during a new connection establishment process for a new network connection by a new client; measuring a similarity between the new stack trace and the plurality of stack trace templates to identify a match to a stack trace template; evaluating the matched stack trace template for a predefined rule requirement; and updating a rule-set database with the matched stack trace template to authenticate new network connection establishments associated with stack templates matching the matched stack trace template.Type: GrantFiled: November 24, 2015Date of Patent: April 24, 2018Assignee: enSilo Ltd.Inventors: Roy Katmor, Tomer Bitton, Udi Yavo, Ido Kelson
-
Publication number: 20160149937Abstract: There is provided a computer implemented method for detection and prevention of an attempt at establishment of a network connection for malicious communication, comprising: detecting a connection establishment process for establishing a network connection, the connection establishment process initiated by code running on a client terminal; analyzing records in at least one stack trace of the initiating code managed at the client terminal, to detect a trial to establish a malicious communication wherein the network connection is used for malicious activity; and blocking establishment of the network connection when the analysis detects the trial to establish the malicious communication based on the network connection.Type: ApplicationFiled: November 24, 2015Publication date: May 26, 2016Inventors: Roy KATMOR, Tomer BITTON, Udi YAVO, Ido KELSON
-
Publication number: 20160149887Abstract: There is provided a method for authenticating an attempt at establishment of a network connection by allowed code, comprising: providing a dataset having previously observed stack trace templates each representing a stack trace pattern prevailing in stack traces recorded by monitoring stacks of clients executing an allowed code during a connection establishment process for establishing network connections related to the allowed code; receiving a new stack trace recorded during a new connection establishment process for a new network connection by a new client; measuring a similarity between the new stack trace and the plurality of stack trace templates to identify a match to a stack trace template; evaluating the matched stack trace template for a predefined rule requirement; and updating a rule-set database with the matched stack trace template to authenticate new network connection establishments associated with stack templates matching the matched stack trace template.Type: ApplicationFiled: November 24, 2015Publication date: May 26, 2016Inventors: Roy KATMOR, Tomer BITTON, Udi YAVO, Ido KELSON
-
Patent number: 8869279Abstract: The detection of web browser-based attacks using browser test launched from a remote source is described. In one example, it is determined that a test should be performed responsive to receiving an HTTP message sent by a client device and a policy. The test is performed with the client device to determine only whether content intended to be communicated between the HTTP client and the web application server using an HTTP message has been modified by malware on the HTTP client. The test includes the sending of an HTTP response to the HTTP client. The results of the test are analyzed and defensive measures are taken.Type: GrantFiled: March 23, 2012Date of Patent: October 21, 2014Assignee: Imperva, Inc.Inventors: Amichai Shulman, Tal Arieh Be'ery, Tomer Bitton
-
Publication number: 20130329183Abstract: Some embodiments of the present invention provide an adapter including one or more electronic components contained within a housing for attachment to eyewear. The housing may include a main body extending in a lengthwise direction, the main body having a front section and a rear section defining opposite ends thereof and a middle section disposed between and connecting the front section and the rear section, and an attachment portion protruding from the main body in a widthwise direction, the attachment portion configured to connect to a portion of a temple of an eyewear frame, wherein a width of the main body decreases from the middle section toward a front end of the front section.Type: ApplicationFiled: June 7, 2013Publication date: December 12, 2013Applicant: PixelOptics, Inc.Inventors: Ronald D. BLUM, Tomer BITTON, Richard CLOMPUS, Mark GRAHAM, William KOKONASKI
-
Publication number: 20120304296Abstract: The detection of web browser-based attacks using browser test launched from a remote source is described. In one example, it is determined that a test should be performed responsive to receiving an HTTP message sent by a client device and a policy. The test is performed with the client device to determine only whether content intended to be communicated between the HTTP client and the web application server using an HTTP message has been modified by malware on the HTTP client. The test includes the sending of an HTTP response to the HTTP client. The results of the test are analyzed and defensive measures are taken.Type: ApplicationFiled: March 23, 2012Publication date: November 29, 2012Inventors: Amichai Shulman, Tal Arieh Be'ery, Tomer Bitton
-
Patent number: D745084Type: GrantFiled: July 18, 2013Date of Patent: December 8, 2015Assignee: Mitsui Chemicals, Inc.Inventors: Ronald D. Blum, Tomer Bitton
-
Patent number: D755281Type: GrantFiled: July 18, 2013Date of Patent: May 3, 2016Assignee: Mitsui Chemicals, Inc.Inventors: Ronald D. Blum, Tomer Bitton