Patents by Inventor Yedidya Dotan

Yedidya Dotan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160344738
    Abstract: First and second security rules are accessed in a configuration file. Comparison points for comparing the first and second security rules are determined. Each comparison point identifies respective rule parameters of the first and second security rules. Respective weights are assigned to the comparison points. For each comparison point, the respective rule parameters are compared against each other to produce a corresponding comparison score indicative of a level similarity. Each comparison score is weighted by the weight assigned to the comparison point corresponding to the comparison score. The weighted comparison scores are combined into a total score indicative of an overall level of similarity between the first and second security rules.
    Type: Application
    Filed: July 23, 2015
    Publication date: November 24, 2016
    Inventors: Yedidya Dotan, Christopher Duane, Daniel Hollingshead, Denis Knjazihhin
  • Publication number: 20160301717
    Abstract: A management entity imports information included in security policies from security devices configured to operate in accordance with respective ones of the security policies. The information is classified into security policy classifications based on commonality in the information across the security policies. The security policy classifications are displayed as selectable security policy classifications. An entry of a policy template name and selections of multiple security policy classifications are received. The security policies in the multiple selected security policy classifications are assigned to a security policy template identified by the entered policy template name.
    Type: Application
    Filed: June 22, 2016
    Publication date: October 13, 2016
    Inventors: Yedidya Dotan, Sanjay Agarwal, Robin Martherus
  • Patent number: 9467343
    Abstract: A method includes receiving a first analytics set performed on a first network security appliance operated internal to a first organization, receiving a second analytics set performed on a second network security appliance operated internal to a second organization, processing the first analytics set and the second analytics set, and responsive to the processing, disseminating to the second network security appliance information indicating that the second analytics set has also been performed on at least the first network security appliance, without revealing an identity of the first organization. In one embodiment at least part of the first analytics set or the second analytics set is hashed.
    Type: Grant
    Filed: September 30, 2014
    Date of Patent: October 11, 2016
    Assignee: EMC CORPORATION
    Inventors: Yedidya Dotan, Brian P. Girardi, Marcelo Blatt, Oleg Freylafert, Kevin D. Bowers, Michael S. Shreve
  • Patent number: 9455972
    Abstract: A technique provisions a mobile device (e.g., a smart phone, a tablet, a personal digital assistant, etc.) with a security application on the fly. The technique involves providing, by processing circuitry of the mobile device, an initial access request to an enterprise gateway which is operated by an enterprise. The technique further involves receiving, by the processing circuitry, an enterprise response message from the enterprise gateway in response to the initial access request. The enterprise response message denies access to a set of enterprise resources of the enterprise. The technique further involves automatically prompting, by the processing circuitry, the mobile device to install a mobile security application from an application server in response to the enterprise response message denying access to the set of enterprise resources of the enterprise.
    Type: Grant
    Filed: September 30, 2013
    Date of Patent: September 27, 2016
    Assignee: EMC Corporation
    Inventors: Yedidya Dotan, Lawrence N. Friedman, Gareth Richards
  • Patent number: 9430634
    Abstract: A technique provides user authentication using a smart device (e.g., a smart phone, a tablet, etc.). The technique involves displaying, by processing circuitry of a smart device, a password prompt on a touch screen of the smart device. The password prompt includes a motion video of touch screen gestures to prompt a user of the smart device to enter a gesture password. The technique further involves receiving, by the processing circuitry, a trial gesture password entered by the user via the touch screen. The trial gesture password includes a user-entered sequence of touch screen gestures. The technique further involves performing, by the processing circuitry, multiple gesture password confirmation operations to verify that the user is able to re-enter the trial gesture password via the touch screen over time to authenticate the user to the smart device.
    Type: Grant
    Filed: March 25, 2014
    Date of Patent: August 30, 2016
    Assignee: EMC Corporation
    Inventors: Yedidya Dotan, Daniel V. Bailey, Lawrence N. Friedman, Gareth Richards
  • Patent number: 9405897
    Abstract: There is disclosed a method and system for use in authenticating an entity. An entity location history is stored comprising a historical record of locations visited by the entity. An authentication request is received from the entity. A pattern of recent locations visited by the entity indicative of irregular behavior is detected. An analysis is performed between the pattern of recent locations indicative of irregular behavior and the entity location history for establishing the riskiness of the authentication request. An authentication result is generated based on the analysis between the pattern of recent locations indicative of irregular behavior and the entity location history.
    Type: Grant
    Filed: June 29, 2012
    Date of Patent: August 2, 2016
    Assignee: EMC Corporation
    Inventors: Daniel V. Bailey, Lawrence N. Friedman, Yedidya Dotan, Samuel Curry
  • Patent number: 9407441
    Abstract: Methods, apparatus and articles of manufacture for adding entropy to key generation on a mobile device are provided herein. A method includes generating a prompt via a computing device interface in connection with an authentication request to access a protected resource associated with the computing device; processing input cryptographic information entered via the computing device interface in response to the prompt against a pre-determined set of cryptographic information, wherein said pre-determined set of cryptographic information comprises one or more input elements and one or more interface manipulation measures associated with the one or more input elements; and resolving the authentication request based on said processing.
    Type: Grant
    Filed: June 26, 2013
    Date of Patent: August 2, 2016
    Assignee: EMC Corporation
    Inventors: Yedidya Dotan, Lawrence N. Friedman, Daniel V. Bailey, John Brainard, William M. Duane
  • Patent number: 9401933
    Abstract: A management entity connects with multiple security devices across a network. Each security device operates in accordance with one or more security policies. The management entity imports, over the network, data describing the security policies from the multiple security devices. The management entity classifies the imported security policies into security policy classifications based on commonality in information included in the security policies across the multiple security devices.
    Type: Grant
    Filed: January 20, 2015
    Date of Patent: July 26, 2016
    Assignee: Cisco Technology, Inc.
    Inventors: Yedidya Dotan, Sanjay Agarwal, Robin Martherus
  • Publication number: 20160212169
    Abstract: A management entity receives from multiple security devices corresponding native security policies each based on a native policy model associated with the corresponding security device. Each security device controls access to resources by devices associated with the security device according to the corresponding native security policy. The management entity normalizes the received native security policies across the security devices based on a generic policy model, to produce a normalized security policy that is based on the generic policy model and representative of the native security polices.
    Type: Application
    Filed: January 20, 2015
    Publication date: July 21, 2016
    Inventors: Denis Knjazihhin, Yedidya Dotan, Burak Say, Robin Martherus, Sachin Vasant
  • Publication number: 20160212170
    Abstract: A management entity displays a plurality of icons, each icon representing an actor or a resource in a networking environment. The management entity defines security policy by receiving user input in the form of lines drawn between icons representing actors and resources to control abilities between actors and resources.
    Type: Application
    Filed: January 20, 2015
    Publication date: July 21, 2016
    Inventors: Robin Martherus, Guy Telner, Yedidya Dotan, Denis Knjazihhin
  • Publication number: 20160212167
    Abstract: A management entity connects with multiple security devices across a network. Each security device operates in accordance with one or more security policies. The management entity imports, over the network, data describing the security policies from the multiple security devices. The management entity classifies the imported security policies into security policy classifications based on commonality in information included in the security policies across the multiple security devices.
    Type: Application
    Filed: January 20, 2015
    Publication date: July 21, 2016
    Inventors: Yedidya Dotan, Sanjay Agarwal, Robin Martherus
  • Publication number: 20160212168
    Abstract: A management entity generates selectable security policy classifications each identifying security policies that share common security rules. Each of the security policies is applied by a corresponding one of different security devices to control access to a resource. The management entity creates a new policy template that includes all of the security policies identified by selected ones of the policy classification selections and then creates a new security policy based on the new policy template. The management entity applies the new security policy to a security device over a network.
    Type: Application
    Filed: January 20, 2015
    Publication date: July 21, 2016
    Inventors: Yedidya Dotan, Christopher Duane, Denis Knjazihhin
  • Patent number: 9397992
    Abstract: A technique provides access control. The technique involves prompting a user to enter color-shape pairings, and receiving multiple color-shape pairings from the user. Each color-shape pairing includes (i) a color selection from multiple selectable colors and (ii) a shape selection from multiple selectable shapes. The technique further involves generating an access control result based on the received multiple color-shape pairings, the access control result controlling access to a set of protected resources. For example, color segments can be displayed on a touch screen in the form of a color wheel, and multiple shapes can be rendered within each color segment. Alternatively, (i) a color palette including the multiple selectable colors and (ii) a shape menu including the multiple selectable shapes can be rendered on the touch screen to prompt the user to provide drag and drop gestures over the touch screen. Other configurations are suitable for use as well.
    Type: Grant
    Filed: December 30, 2013
    Date of Patent: July 19, 2016
    Assignee: EMC Corporation
    Inventors: Yedidya Dotan, Daniel V. Bailey, Lawrence N. Friedman, Gareth Richards
  • Patent number: 9356968
    Abstract: A technique manages user authentication via common authentication framework circuitry. The technique involves receiving, by the common authentication framework circuitry, authentication requests from client devices of users belonging to multiple enterprises, the authentication requests including user identifiers identifying the users belonging to the multiple enterprises. The technique further involves accessing, by the common authentication framework circuitry, entries of an authentication policy database to select authentication policies for the authentication requests. Selection of the authentication policies is based at least in part on the user identifiers of the authentication requests. The technique further involves invoking, by the common authentication framework circuitry, authentication services in accordance with the selected authentication policies to perform user authentication operations in response to the authentication requests from the client devices.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: May 31, 2016
    Assignee: EMC Corporation
    Inventors: Yedidya Dotan, Kayvan Alikhani, Mohsen Emami-Nouri, Vadim Bruk, Andrew Luke, Lawrence N. Friedman
  • Patent number: 9332434
    Abstract: Improved techniques are directed to a method performed by a computing device of authenticating a mobile client device to a resource using location services. The method includes (a) receiving authentication requests from the mobile client device, the authentication requests each including a location freshness value indicating a respective amount of time that has passed since the mobile client device last determined its location, (b) testing the location freshness value received in each authentication request against a location freshness policy to generate a freshness result indicating whether the location freshness value complies with the location freshness policy, (c) generating an authentication response for each authentication request based at least in part on the location freshness result for that authentication request, and (d) directing the authentication response to be sent to the resource.
    Type: Grant
    Filed: December 31, 2013
    Date of Patent: May 3, 2016
    Assignee: EMC Corporation
    Inventors: Yedidya Dotan, Lawrence N. Friedman, Shane Rice
  • Patent number: 9332433
    Abstract: A technique performs authentication before delivering a token to a client device. The technique involves receiving a first message from a first application on the client device, the first message including a token request and a first set of authentication factors. The technique further involves receiving a second message from a second application on the client device, the second message including an authentication request and a second set of authentication factors. The technique further involves generating a result message which (i) provides access to a token for use by the client device when the first set of authentication factors is consistent with the second set of authentication factors, and (ii) rejects the token request when the first set of authentication factors is inconsistent with the second set of authentication factors. The client device may be a mobile device, and the first and second messages may be received via wireless communications.
    Type: Grant
    Filed: September 30, 2013
    Date of Patent: May 3, 2016
    Assignee: EMC Corporation
    Inventors: Yedidya Dotan, Lawrence N. Friedman, Riaz Zolfonoon, Gareth Richards, Guoying Luo
  • Patent number: 9305151
    Abstract: A technique performs user authentication. The technique involves receiving, by processing circuitry, an authentication request which includes a set of authentication factors and which identifies a particular user. The technique further involves performing, by the processing circuitry, an authentication operation to generate an authentication result in response to the authentication request, the authentication result being based on (i) the set of authentication factors of the authentication request, (ii) a user authentication profile which profiles the particular user, and (iii) a lockout state identifying a lockout condition of the particular user which existed at the time of receiving the authentication request. The technique further involves providing, by the processing circuitry and as a response to the authentication request, an authentication action based on the authentication result.
    Type: Grant
    Filed: December 23, 2013
    Date of Patent: April 5, 2016
    Assignee: EMC Corporation
    Inventors: Yedidya Dotan, Lakshmi Suresh, John Watts, Marcelo Blatt
  • Patent number: 9282114
    Abstract: Embodiments relate to the generation of alerts in an event management system based upon risk. When an event device associated with the event management system, presents a logon page to a client device, the event device includes a beacon as part of the page to monitor and collect web device profile characteristics related to the client device. In response to a logon attempt by the client device, an event management device receives a notification regarding logon attempt and a risk assessment associated with the web device profile characteristics of the client device. Based upon a correlation of the notification and the corresponding risk assessment, the event management device can generate an alert, such as a SIEM alert, and can include an indication of priority, whether relatively low or high, and/or a confidence factor, whether or not the alert can be suppressed as part of the alert.
    Type: Grant
    Filed: June 30, 2011
    Date of Patent: March 8, 2016
    Assignee: EMC Corporation
    Inventors: Yedidya Dotan, Lawrence N. Friedman, Manoj Nair, Riaz Zolfonoon
  • Patent number: 9240986
    Abstract: A method is used in managing security and wireless signal detection. Information is gathered about analog signal reception at a receiver. Based on the information, a result is produced for use in determining location information at the receiver. The result is used to affect a security decision.
    Type: Grant
    Filed: September 27, 2012
    Date of Patent: January 19, 2016
    Assignee: EMC Corporation
    Inventors: Karl Ackerman, William W. Duane, Yedidya Dotan
  • Patent number: 9237143
    Abstract: Authentication employs a classification that monitors content of authentication requests and results and assigns and records risk values identifying low-risk sources making normal authentication requests and high-risk sources making abnormal authentication requests indicative of fraud activity. Then for low-risk sources, a normal authentication process is employed having differential success/fail behavior exposing information about an enumerable system resource, such as a user account. Example differential behavior includes (a) granting access when a request identifies a valid user account, and (b) otherwise denying access, enabling an attacker to learn whether a guessed value identifies an existing account.
    Type: Grant
    Filed: September 26, 2013
    Date of Patent: January 12, 2016
    Assignee: EMC Corporation
    Inventors: Yedidya Dotan, Lakshmi Suresh, John Watts, Paul Dennis