Patents by Inventor Yoav Kirsch

Yoav Kirsch has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9130777
    Abstract: Disclosed are methods, media, and vault servers for providing a secure messaging system using vault servers in conjunction with client-side restricted-execution vault-mail environments. Methods include the steps of upon activating a vault-mail message containing sensitive content, removing the content from the vault-mail message; placing the content on a vault server; creating a link in the vault-mail message to the content on the vault server; sending the vault-mail message to a designated recipient; and upon activating the link, allowing the content to be only viewed in a restricted-execution session of a client application, wherein the restricted-execution session does not allow the content to be altered, copied, stored, printed, forwarded, or otherwise executed. Preferably, the activation of the vault-mail message is performed by a network-security gateway, and can be performed on a per-message basis.
    Type: Grant
    Filed: November 19, 2008
    Date of Patent: September 8, 2015
    Assignee: Check Point Software Technologies, LTD.
    Inventors: Oded Gonda, Ofer Raz, Alon Kantor, Uri Bialik, Yoav Kirsch
  • Patent number: 8254698
    Abstract: The present invention discloses methods for document-to-template matching for data-leak prevention (DLP), the methods including the steps of: providing a document as a stream of characters; splitting the stream into a plurality of serialized data lines; calculating a hash value for each serialized data line; checking for each hash value in a hash map of a template set; determining a similarity match to a particular template based on a predefined threshold of template hash values, of the template set, being found in the stream; and based on the similarity match, executing a DLP security policy for the document. Preferably, the template set is extracted from documents manually prepared by a security administrator. Preferably, each template in the template set is deduced automatically from a plurality of documents.
    Type: Grant
    Filed: April 2, 2009
    Date of Patent: August 28, 2012
    Assignee: Check Point Software Technologies Ltd
    Inventors: Alon Kantor, Liran Antebi, Yoav Kirsch, Uri Bialik
  • Patent number: 8051187
    Abstract: Disclosed are methods for automatic categorization of internal and external communication, the method including the steps of: defining groups of entities that transmit data; monitoring data flow of the groups; extracting the data, from the data flow, for learning traffic-flow characteristics of the groups; classifying the data into group flows; upon the data being transmitted, checking the data to determine whether the data is designated as group-internal; and blocking data traffic for data that is group-internal. Preferably, the step of monitoring includes assigning data weights to the data using Bayesian methods. Most preferably, the step of classifying includes classifying the data using Bayesian methods for evaluating the data weights. Preferably, the step of blocking includes blocking data traffic between members of two or more groups. Preferably, the method further includes the step of: enabling an authorized entity to unblock the data traffic.
    Type: Grant
    Filed: December 22, 2008
    Date of Patent: November 1, 2011
    Assignee: Check Point Software Technologies Ltd.
    Inventors: Tomer Noy, Alon Kantor, Uri Bialik, Yoav Kirsch
  • Publication number: 20100254615
    Abstract: The present invention discloses methods for document-to-template matching for data-leak prevention (DLP), the methods including the steps of: providing a document as a stream of characters; splitting the stream into a plurality of serialized data lines; calculating a hash value for each serialized data line; checking for each hash value in a hash map of a template set; determining a similarity match to a particular template based on a predefined threshold of template hash values, of the template set, being found in the stream; and based on the similarity match, executing a DLP security policy for the document. Preferably, the template set is extracted from documents manually prepared by a security administrator. Preferably, each template in the template set is deduced automatically from a plurality of documents.
    Type: Application
    Filed: April 2, 2009
    Publication date: October 7, 2010
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES, LTD.
    Inventors: ALON KANTOR, LIRAN ANTEBI, YOAV KIRSCH, URI BIALIK
  • Publication number: 20100161830
    Abstract: Disclosed are methods for automatic categorization of internal and external communication, the method including the steps of: defining groups of entities that transmit data; monitoring data flow of the groups; extracting the data, from the data flow, for learning traffic-flow characteristics of the groups; classifying the data into group flows; upon the data being transmitted, checking the data to determine whether the data is designated as group-internal; and blocking data traffic for data that is group-internal. Preferably, the step of monitoring includes assigning data weights to the data using Bayesian methods. Most preferably, the step of classifying includes classifying the data using Bayesian methods for evaluating the data weights. Preferably, the step of blocking includes blocking data traffic between members of two or more groups. Preferably, the method further includes the step of: enabling an authorized entity to unblock the data traffic.
    Type: Application
    Filed: December 22, 2008
    Publication date: June 24, 2010
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES, LTD.
    Inventors: Tomer Noy, Alon Kantor, Uri Bialik, Yoav Kirsch
  • Publication number: 20100125637
    Abstract: Disclosed are methods, media, and vault servers for providing a secure messaging system using vault servers in conjunction with client-side restricted-execution vault-mail environments. Methods include the steps of upon activating a vault-mail message containing sensitive content, removing the content from the vault-mail message; placing the content on a vault server; creating a link in the vault-mail message to the content on the vault server; sending the vault-mail message to a designated recipient; and upon activating the link, allowing the content to be only viewed in a restricted-execution session of a client application, wherein the restricted-execution session does not allow the content to be altered, copied, stored, printed, forwarded, or otherwise executed. Preferably, the activation of the vault-mail message is performed by a network-security gateway, and can be performed on a per-message basis.
    Type: Application
    Filed: November 19, 2008
    Publication date: May 20, 2010
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES, LTD.
    Inventors: Oded GONDA, Ofer Raz, Alon Kantor, Uri Bialik, Yoav Kirsch