Patents by Inventor Yair Tor

Yair Tor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120084850
    Abstract: Embodiments of the invention enable a client device to procure trustworthy device claims describing one or more attributes of the client device, have those device claims included in a data structure having a format suitable for processing by an application, and use the data structure which includes the device claims in connection with a request to access the application. The application may use the device claims to drive any of numerous types of application functionality, such as security-related and/or other functionality.
    Type: Application
    Filed: January 27, 2011
    Publication date: April 5, 2012
    Applicant: Microsoft Corporation
    Inventors: Mark Novak, Yair Tor, Eugene (John) Neystadt, Yoav Yassour, Alexey Efron, Amos Ortal, Daniel Alon, Ran Didi
  • Publication number: 20120084851
    Abstract: Embodiments of the invention make the issuance of trustworthy device claims available to client devices as a service, so that a client device to which device claims are issues may use the device claims in relation to an attempt to access a network application. The service may conduct an assessment of the device's characteristics and/or state, characterize the results of this assessment in device claims, and issue the device claims to the device. The service may be accessible to a client device from outside administrative boundaries of an entity that makes a network application accessible, and thus may be useful to entities making network applications accessible in business-to-consumer (B2C) and business-to-business (B2B) topologies, such as over the publicly accessible Internet.
    Type: Application
    Filed: January 27, 2011
    Publication date: April 5, 2012
    Applicant: Microsoft Corporation
    Inventors: Eugene (John) Neystadt, Daniel Alon, Yair Tor, Mark Novak, Khaja E. Ahmed, Yoav Yassour
  • Publication number: 20110321130
    Abstract: Embodiments of the invention provide techniques for basing access control decisions at the network layer at least in part on information provided in claims, which may describe attributes of a computer requesting access, one or more resources to which access is requested, the user, the circumstances surrounding the requested access, and/or other information. The information may be evaluated based on one or more access control policies, which may be pre-set or dynamically generated, and used in making a decision whether to grant or deny the computer access to the specified resource(s).
    Type: Application
    Filed: June 24, 2010
    Publication date: December 29, 2011
    Applicant: Microsoft Corporation
    Inventors: Yair Tor, Daniel Rose, Eugene (John) Neystadt, Patrik Schnell, Moshe Sapir, Oleg Ananiev, Arthur Zavalkovsky, Anat Eyal
  • Publication number: 20110321152
    Abstract: Embodiments of the invention provide a trusted intermediary for use in a system in which access control decisions may be based at least in part on information provided in claims. The intermediary may request claims on behalf of a network resource to which access is requested, and submit the claims for a decision whether to grant or deny access. The decision may be based at least in part on one or more access control policies, which may be pre-set or dynamically generated. Because the intermediary requests the claims and submits the claims for an access control decision, the network resource (e.g., a server application) need not be configured to process claims information.
    Type: Application
    Filed: June 24, 2010
    Publication date: December 29, 2011
    Applicant: Microsoft Corporation
    Inventors: Yair Tor, Eugene (John) Neystadt, Patrik Schnell, Oleg Ananiev, Arthur Zavalkovsky, Daniel Rose
  • Publication number: 20110138442
    Abstract: Architecture that provides additional data that can be obtained and employed in security models in order to provide security to services over the service lifecycle. The architecture automatically propagates security classifications throughout the lifecycle of the service, which can include initial deployment, expansion, moving servers, monitoring, and reporting, for example, and further include classification propagation from the workload (computer), classification propagation in the model, classification propagation according to the lineage of the storage location (e.g., virtual hard drive), status propagation in the model and classification based on data stored in the machine.
    Type: Application
    Filed: March 19, 2010
    Publication date: June 9, 2011
    Applicant: Microsoft Corporation
    Inventors: Anders B. Vinberg, John Neystadt, Yair Tor, Oleg Ananiev
  • Publication number: 20080320593
    Abstract: An intrusion control system, method and computer readable medium. The system includes an input interface adapted to receive traffic over a session opened between a user and a computerized system; and a processor, adapted to control the session while determining whether the traffic is a part of an attack. The method includes determining an occurrence of an attack; and mitigating the attack by providing false information representative of a defense capability of a computerized system.
    Type: Application
    Filed: February 28, 2006
    Publication date: December 25, 2008
    Applicant: BEEFENCE LTD
    Inventors: Asaf Greiner, Yair Tor