Patents by Inventor Yigal Edery

Yigal Edery has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090178132
    Abstract: Secure content management is enabled as a cloud-based service through which security protection and policy enforcement may be implemented for both on-premise network users and roaming users. The global SCM service integrates the security functionalities—such as anti-virus, spyware, and phishing protection, firewall, intrusion detection, centralized management, and the like—that are typically provided by enterprise network SCM appliance hardware or servers into a cloud-based service that users reach via Internet-based points-of-presence (“POPs”). The POPs are configured with forward proxy servers, and in some implementations, caching and network acceleration components, and coupled to hubs which provide configuration management and identity management services such as active directory services.
    Type: Application
    Filed: August 14, 2008
    Publication date: July 9, 2009
    Applicant: Microsoft Corporation
    Inventors: Efim Hudis, Yigal Edery, Oleg Ananiev, John Wohlfert, Nir Nice
  • Publication number: 20090178108
    Abstract: Secure content management is enabled as a cloud-based service through which security protection and policy enforcement may be implemented for both on-premise network users and off-premise or roaming users. The global SCM service integrates the security functionalities—such as anti-virus, spyware, and phishing protection, firewall, intrusion detection, centralized management, and the like—that are typically provided by enterprise network SCM appliance hardware or servers into a cloud-based service that users reach via Internet-based points-of-presence (“POPs”). The POPs are configured with forward proxy servers, and in some implementations, caching and network acceleration components, and coupled to hubs which provide configuration management and identity management services such as active directory services.
    Type: Application
    Filed: August 14, 2008
    Publication date: July 9, 2009
    Applicant: Microsoft Corporation
    Inventors: Efim Hudis, Yigal Edery, Oleg Ananiev, John Wohlfert, Nir Nice
  • Publication number: 20090177514
    Abstract: Secure content management is enabled as a cloud-based service through which security protection and policy enforcement may be implemented for both on-premise network users and roaming users. The global SCM service integrates the security functionalities—such as anti-virus, spyware, and phishing protection, firewall, intrusion detection, centralized management, and the like—that are typically provided by enterprise network SCM appliance hardware or servers into a cloud-based service that users reach via Internet-based points-of-presence (“POPs”). The POPs are configured with forward proxy servers, and in some implementations, caching and network acceleration components, and coupled to hubs which provide configuration management and identity management services such as active directory services.
    Type: Application
    Filed: August 14, 2008
    Publication date: July 9, 2009
    Applicant: Microsoft Corporation
    Inventors: Efim Hudis, Yigal Edery, Oleg Ananiev, John Wohlfert, Nir Nice
  • Publication number: 20080301796
    Abstract: A client transmits requests via a gateway to a server in a network environment. The requests indicate content on a server to be transmitted as part of download process. The gateway receives into its memory the requested content and also maintains characteristics of the server and the client. The gateway adjusts the depth of scanning of the content for malware based on the retrieved server and client characteristics in order to optimize a balance between effectiveness of anti-malware scanning and a resulting user experience.
    Type: Application
    Filed: May 31, 2007
    Publication date: December 4, 2008
    Applicant: MICROSOFT CORPORATION
    Inventors: Vladimir Holostov, Yigal Edery
  • Publication number: 20080295176
    Abstract: A client device transmits requests via a gateway to a server in a network environment. The requests indicate specific portions of a file on a server to be transmitted as part of the download process. The gateway receives into its memory the requested portions of the file and assembles the received portions into an assembly file. The gateway continuously scans the largest contiguous sequence of the portions in the assembly file for viruses while the requested portions of the file are being received and become available before feeding the received portions to the client computer. By scanning the largest consecutive sequence while new portions become available, the time to complete the scan is reduced thereby increasing the throughput of the gateway.
    Type: Application
    Filed: May 24, 2007
    Publication date: November 27, 2008
    Applicant: MICROSOFT CORPORATION
    Inventors: Vladimir Holostov, Yigal Edery
  • Publication number: 20060236392
    Abstract: In accordance with the present invention, a system, method, and computer-readable medium for aggregating the knowledge base of a plurality of security services or other event collection systems to protect a computer from malware is provided. One aspect of the present invention is a method that proactively protects a computer from malware. More specifically, the method comprises: using anti-malware services or other event collection systems to observe suspicious events that are potentially indicative of malware; determining if the suspicious events satisfy a predetermined threshold; and if the suspicious events satisfy the predetermined threshold, implementing a restrictive security policy designed to prevent the spread of malware.
    Type: Application
    Filed: March 31, 2005
    Publication date: October 19, 2006
    Applicant: Microsoft Corporation
    Inventors: Anil Thomas, Michael Kramer, Mihai Costea, Efim Hudis, Pradeep Bahl, Rajesh Dadhia, Yigal Edery
  • Publication number: 20060224724
    Abstract: In accordance with the present invention, a system, method, and computer-readable medium for identifying malware at a network transit point such as a computer that serves as a gateway to an internal or private network is provided. A network transmission is scanned for malware at a network transit point without introducing additional latency to the transmission of data over the network. In accordance with one aspect of the present invention, a computer-implemented method for identifying malware at a network transit point is provided. More specifically, when a packet in a transmission is received at the network transit point, the packet is immediately forwarded to the target computer. Simultaneously, the packet and other data in the transmission are scanned for malware by an antivirus engine. If malware is identified in the transmission, the target computer is notified that the transmission contains malware.
    Type: Application
    Filed: March 31, 2005
    Publication date: October 5, 2006
    Applicant: Microsoft Corporation
    Inventors: Adrian Marinescu, Marc Seinfeld, Michael Kramer, Yigal Edery
  • Publication number: 20060149968
    Abstract: Protection systems and methods provide for protecting one or more personal computers (“PCs”) and/or other intermittently or persistently network accessible devices or processes from undesirable or otherwise malicious operations of Java™ applets, ActiveX™ controls, JavaScript™ scripts, Visual Basic scripts, add-ins, downloaded/uploaded programs or other “Downloadables” or “mobile code” in whole or part. A protection engine embodiment provides, within a server, firewall or other suitable “re-communicator,” for monitoring information received by the communicator, determining whether received information does or is likely to include executable code, and if so, causes mobile protection code (MPC) to be transferred to and rendered operable within a destination device of the received information, more suitably by forming a protection agent including the MPC, protection policies and a detected-Downloadable.
    Type: Application
    Filed: March 7, 2006
    Publication date: July 6, 2006
    Inventors: Yigal Edery, Nimrod Vered, David Kroll, Shlomo Touboul
  • Publication number: 20060026677
    Abstract: Protection systems and methods provide for protecting one or more personal computers (“PCs”) and/or other intermittently or persistently network accessible devices or processes from undesirable or otherwise malicious operations of Java™ applets, ActiveX™ controls, JavaScript™ scripts, Visual Basic scripts, add-ins, downloaded/uploaded programs or other “Downloadables” or “mobile code” in whole or part. A protection engine embodiment provides, within a server, firewall or other suitable “re-communicator,” for monitoring information received by the communicator, determining whether received information does or is likely to include executable code, and if so, causes mobile protection code (MPC) to be transferred to and rendered operable within a destination device of the received information, more suitably by forming a protection agent including the MPC, protection policies and a detected-Downloadable.
    Type: Application
    Filed: June 22, 2005
    Publication date: February 2, 2006
    Inventors: Yigal Edery, Nimrod Vered, David Kroll, Shlomo Touboul
  • Publication number: 20050228984
    Abstract: A firewall device implements policies for a destination web service, where the policies determine the access rights of clients and other web services to services that are available at the destination web service. The clients and web services send requests in the form of web service messages which are processed by the firewall server based on the policies.
    Type: Application
    Filed: April 7, 2004
    Publication date: October 13, 2005
    Inventors: Yigal Edery, Ron Mondri