Patents by Inventor Yuval Ben-Itzhak

Yuval Ben-Itzhak has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9110595
    Abstract: A system for enhancing performance of a software application obtains a list of files to be processed by the software application, and sorts that list in the order of the physical position of files in the list on a hard drive. The files are loaded in the sorted order which can decrease or minimize the total file seeking time, thereby increasing the speed of execution of the software.
    Type: Grant
    Filed: February 28, 2012
    Date of Patent: August 18, 2015
    Assignee: AVG Netherlands B.V.
    Inventors: Yuval Ben-Itzhak, Ing. Z. Breitenbacher, Ji{hacek over (r)}í Bracek, Jaroslav Nix, Martin Vejnár, Tomá{hacek over (s)} Benna, Marián Jurík, Václav Pich
  • Publication number: 20150193240
    Abstract: In a method for improving the performance of a computer system by releasing computer resources, a list P of programs installed on a computer system is determined. All relevant extension points EP of the computer system are searched for registered entries. A list A of automatically starting programs is generated by assigning the registered entries at the relevant extension points EP to the installed programs, respectively. The list A of the automatically starting programs is compared with a list S of system-required programs and a list V of used programs. Programs that are not system-required and programs that have not been used for a longer period of time are deactivated and computer resources that have been used by the deactivated programs are released. The deactivation of programs can be done by the user or automatically and can be cancelled when necessary.
    Type: Application
    Filed: March 18, 2015
    Publication date: July 9, 2015
    Inventors: Yuval Ben-Itzhak, Tibor Schiemann
  • Patent number: 9058612
    Abstract: A potentially beneficial software product is recommended to a user based, in part, on an analysis of parameters associated with the user's usage of software applications already installed on the user's computer.
    Type: Grant
    Filed: May 27, 2011
    Date of Patent: June 16, 2015
    Assignee: AVG Netherlands B.V.
    Inventor: Yuval Ben-Itzhak
  • Publication number: 20150113652
    Abstract: Software applications are analyzed to determine if they are legitimate applications and warnings are provided to users to avoid installation and/or purchases of unnecessary and/or potentially harmful software based on comparisons of user-interface characteristics of the software applications to visual characteristics of authentic applications to determine to what extent they match (or do not match) or are attempting to mirror the legitimate application.
    Type: Application
    Filed: December 23, 2014
    Publication date: April 23, 2015
    Inventors: Yuval Ben-Itzhak, Kaspars Osis, Mike Boz
  • Publication number: 20150024787
    Abstract: A mobile device tracking prevention method and system includes monitoring a mobile device for movement, determining whether an operating state of a wireless module of the mobile device should be adjusted when movement of the mobile device is detected, and controlling the operating state of the wireless module based on the determination. One or more of the actual geographic location of the mobile device, network IDs broadcasted by nearby network access points, and signal strengths of the access points as detected by the mobile device can be monitored to detect movement of the mobile device. Changes to any of these may be indicative of movement of the mobile device, which may serve as the basis for enabling or disabling the wireless module to prevent tracking of the mobile device without sacrificing user productivity.
    Type: Application
    Filed: July 2, 2014
    Publication date: January 22, 2015
    Inventors: Yuval Ben-Itzhak, Shaul Levi, Pavel Mironchyk
  • Publication number: 20150020083
    Abstract: Systems and methods for providing user-specific content on an electronic device are disclosed. The user-specific data can be generated in isolated applications that are prohibited from communicating directly with one another. Sharing of user data that enables these isolated applications to generate such user-specific data can be facilitated by the use of a master program that can be loaded along with each of the isolated applications on the electronic device.
    Type: Application
    Filed: July 10, 2013
    Publication date: January 15, 2015
    Inventor: Yuval BEN-ITZHAK
  • Publication number: 20150007321
    Abstract: A security system, including a receiver for receiving a downloadable, a scanner, coupled with the receiver, for scanning the downloadable to identify suspicious computer operations therein, a code modifier, coupled with the scanner, for overwriting the suspicious computer operations with substitute computer operations, if at least one suspicious computer operation is identified by the scanner, and for appending monitoring program code to the downloadable thereby generating a modified downloadable, if at least one suspicious computer operation is identified by the scanner, and a processor, coupled with the code modifier, for executing programmed instructions, wherein the monitoring program code includes program instructions for the processor to validate input parameters for the suspicious computer operations during run-time of the downloadable. A method is also described and claimed.
    Type: Application
    Filed: September 10, 2014
    Publication date: January 1, 2015
    Inventors: Yuval Ben-Itzhak, Golan Yosef, Israel Taub
  • Publication number: 20140331323
    Abstract: Software applications are analyzed to determine if they are legitimate applications and warnings are provided to users to avoid installation and/or purchases of unnecessary and/or potentially harmful software based on comparisons of user-interface characteristics of the software applications to visual characteristics of authentic applications to determine to what extent they match (or do not match) or are attempting to mirror the legitimate application.
    Type: Application
    Filed: May 16, 2014
    Publication date: November 6, 2014
    Applicant: AVG Netherlands B.V.
    Inventors: Yuval Ben-Itzhak, Kaspars Osis, Mike Boz
  • Patent number: 8769690
    Abstract: Instructions allowing their recipient to access content via a computer network are intercepted at a destination device sending the instructions via a host-server. Content of an instruction is analyzed at the destination device for malicious components, and results of the analysis are associated with the content prior to being presented to viewers of the content.
    Type: Grant
    Filed: July 9, 2010
    Date of Patent: July 1, 2014
    Assignee: AVG Netherlands B.V.
    Inventors: Yuval Ben-Itzhak, Gregory Andrew Mosher
  • Patent number: 8732831
    Abstract: Software applications are analyzed to determine if they are legitimate applications and warnings are provided to users to avoid installation and/or purchases of unnecessary and/or potentially harmful software based on comparisons of user-interface characteristics of the software applications to visual characteristics of authentic applications to determine to what extent they match (or do not match) or are attempting to mirror the legitimate application.
    Type: Grant
    Filed: July 14, 2011
    Date of Patent: May 20, 2014
    Assignee: AVG Netherlands B.V.
    Inventors: Yuval Ben-Itzhak, Kaspars Osis, Mike Boz
  • Publication number: 20140040610
    Abstract: A system for secure communication, including a first security computer communicatively coupled with a client computer via an SSL connection, including a certificate creator, for receiving certificate attributes of a server computer certificate and for creating a signed certificate therefrom, and an SSL connector, for performing an SSL handshake with the client computer using the signed certificate created by said certificate creator, and a second security computer communicatively coupled with a server computer via an SSL connection, and communicatively coupled with the first security computer via a non-SSL connection, including an SSL connector, for performing an SSL handshake with the server computer using a signed certificate provided by the server computer, and a protocol appender, for appending attributes of the signed certificate provided by the server computer within a message communicated to the first security computer. A method is also described and claimed.
    Type: Application
    Filed: October 2, 2013
    Publication date: February 6, 2014
    Applicant: Finjan, Inc.
    Inventors: Yuval Ben-Itzhak, Shay Lang, Dmitry Rubinstein
  • Patent number: 8566580
    Abstract: A system for secure communication, including a first security computer communicatively coupled with a client computer via an SSL connection, including a certificate creator, for receiving certificate attributes of a server computer certificate and for creating a signed certificate therefrom, and an SSL connector, for performing an SSL handshake with the client computer using the signed certificate created by said certificate creator, and a second security computer communicatively coupled with a server computer via an SSL connection, and communicatively coupled with the first security computer via a non-SSL connection, including an SSL connector, for performing an SSL handshake with the server computer using a signed certificate provided by the server computer, and a protocol appender, for appending attributes of the signed certificate provided by the server computer within a message communicated to the first security computer. A method is also described and claimed.
    Type: Grant
    Filed: July 23, 2008
    Date of Patent: October 22, 2013
    Assignee: Finjan, Inc.
    Inventors: Yuval Ben-Itzhak, Shay Lang, Dmitry Rubinstein
  • Publication number: 20130227544
    Abstract: A system for enhancing performance of a software application obtains a list of files to be processed by the software application, and sorts that list in the order of the physical position of files in the list on a hard drive. The files are loaded in the sorted order which can decrease or minimize the total file seeking time, thereby increasing the speed of execution of the software.
    Type: Application
    Filed: February 28, 2012
    Publication date: August 29, 2013
    Inventors: Yuval Ben-Itzhak, Ing Z. Breitenbacher, Jirí Bracek, Jaroslav Nix, Martin Vejnár, Tomás Benna, Marián Jurik, Václav Pich
  • Publication number: 20130019310
    Abstract: Software applications are analyzed to determine if they are legitimate applications and warnings are provided to users to avoid installation and/or purchases of unnecessary and/or potentially harmful software based on comparisons of user-interface characteristics of the software applications to visual characteristics of authentic applications to determine to what extent they match (or do not match) or are attempting to mirror the legitimate application.
    Type: Application
    Filed: July 14, 2011
    Publication date: January 17, 2013
    Inventors: Yuval Ben-Itzhak, Kaspars Osis, Mike Boz
  • Publication number: 20120303477
    Abstract: A potentially beneficial software product is recommended to a user based, in part, on an analysis of parameters associated with the user's usage of software applications already installed on the user's computer.
    Type: Application
    Filed: May 27, 2011
    Publication date: November 29, 2012
    Inventor: Yuval Ben-Itzhak
  • Publication number: 20120144485
    Abstract: A security system, including a receiver for receiving a downloadable, a scanner, coupled with the receiver, for scanning the downloadable to identify suspicious computer operations therein, a code modifier, coupled with the scanner, for overwriting the suspicious computer operations with substitute computer operations, if at least one suspicious computer operation is identified by the scanner, and for appending monitoring program code to the downloadable thereby generating a modified downloadable, if at least one suspicious computer operation is identified by the scanner, and a processor, coupled with the code modifier, for executing programmed instructions, wherein the monitoring program code includes program instructions for the processor to validate input parameters for the suspicious computer operations during run-time of the downloadable. A method is also described and claimed.
    Type: Application
    Filed: July 16, 2008
    Publication date: June 7, 2012
    Applicant: FINJAN SOFTWARE, LTD.
    Inventors: Yuval Ben-Itzhak, Golan Yosef, Israel Taub
  • Patent number: 8141154
    Abstract: A method for protecting a client computer from dynamically generated malicious content, including receiving at a gateway computer content being sent to a client computer for processing, the content including a call to an original function, and the call including an input, modifying the content at the gateway computer, including replacing the call to the original function with a corresponding call to a substitute function, the substitute function being operational to send the input to a security computer for inspection, transmitting the modified content from the gateway computer to the client computer, processing the modified content at the client computer, transmitting the input to the security computer for inspection when the substitute function is invoked, determining at the security computer whether it is safe for the client computer to invoke the original function with the input, transmitting an indicator of whether it is safe for the client computer to invoke the original function with the input, from th
    Type: Grant
    Filed: June 14, 2010
    Date of Patent: March 20, 2012
    Assignee: Finjan, Inc.
    Inventors: David Gruzman, Yuval Ben-Itzhak
  • Publication number: 20120047509
    Abstract: Priorities of an application and/or processes associated with an application executing on a computer is determined according to user-specific usage patterns of the application and stored for subsequent use, analysis and distribution.
    Type: Application
    Filed: August 23, 2010
    Publication date: February 23, 2012
    Inventor: Yuval Ben-Itzhak
  • Patent number: 8087079
    Abstract: A method for scanning files for security, including receiving an unfamiliar file for scanning, if the determining indicates that the mime type is suitable for analysis, then processing a buffer of file data from the unfamiliar file, including generating a histogram of frequencies of occurrence of bytes within a buffer of file data from the unfamiliar file, excluding a designated set of bytes, and if the generated histogram of frequencies of occurrence of the non-excluded bytes deviates substantially from a reference distribution, then signaling that the unfamiliar file is potentially malicious. A system and a computer-readable storage medium are also described and claimed.
    Type: Grant
    Filed: May 4, 2007
    Date of Patent: December 27, 2011
    Assignee: Finjan, Inc.
    Inventor: Yuval Ben-Itzhak
  • Publication number: 20110030058
    Abstract: Instructions to access content at a destination node is intercepted. Content at the destination node is analyzed for malicious components, and results of the analysis are associated with the content prior to being presented to viewers of the content.
    Type: Application
    Filed: July 9, 2010
    Publication date: February 3, 2011
    Inventors: Yuval Ben-Itzhak, Gregory A. Mosher