Check Point Software Technologies Ltd.

Israel

Back to Profile

1-100 of 132 for Check Point Software Technologies Ltd. Sort by
Query
Excluding Subsidiaries
Aggregations Reset Report
IP Type
        Patent 109
        Trademark 23
Jurisdiction
        United States 115
        Canada 9
        Europe 7
        World 1
Date
2025 October 1
2025 September 2
2025 9
2024 6
2023 8
See more
IPC Class
H04L 29/06 - Communication control; Communication processing characterised by a protocol 56
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements 19
H04L 9/40 - Network security protocols 18
G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity 11
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure 9
See more
NICE Class
09 - Scientific and electric apparatus and instruments 21
42 - Scientific, technological and industrial services, research and design 11
16 - Paper, cardboard and goods made from these materials 8
41 - Education, entertainment, sporting and cultural services 4
38 - Telecommunications services 1
Status
Pending 5
Registered / In Force 127
  1     2        Next Page

1.

ANOMALY DETECTION IN MONITORED COMPUTER SYSTEMS

      
Application Number 18621324
Status Pending
Filing Date 2024-03-29
First Publication Date 2025-10-02
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Ben-Shlomo, Yosef
  • Ben-Dor, Uri
  • Israel, Erez
  • Shohat, Ronen Nisan

Abstract

A computer device and method are provided for detecting anomalies in a monitored computer system by classifying detected events using a machine learning model trained based on an activity log of events detected during an initial activity period. The machine learning model embeds logged events by generating a vector based on a tokenization of the logged event and a categorization of the logged event by a large language model. Events detected during the initial activity period are used to generate a profile of the monitored computer system. Events detected after the initial activity period are compared to the generated profile by a classifier of the machine learning model to classify each detected event as anomalous or normal.

IPC Classes  ?

  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 40/284 - Lexical analysis, e.g. tokenisation or collocates

2.

System and method for protecting against wipers by delaying suspicious actions

      
Application Number 18604942
Grant Number 12493697
Status In Force
Filing Date 2024-03-14
First Publication Date 2025-09-18
Grant Date 2025-12-09
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Orevi, Liran
  • David, Haggai
  • Moshkovich, Ilan
  • Karniushka, Mikita
  • Kavalenka, Pavel

Abstract

A device and method are provided for protecting against malware attacks affecting a computer system. To do so, system operations are detected and categorized as benign, suspicious, or malicious. Suspicious actions are delayed and placed in a queue instead of being immediately executed. The process initiating the suspicious action is determined and the suspicious action is categorized as benign or malicious based on the initiating process. When the suspicious action is categorized as a benign action, the suspicious action is performed. Conversely, when the suspicious action is categorized as a malicious action, the suspicious process is terminated, and the malicious action is removed from the unperformed actions queue without performing the malicious action.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

3.

Dynamic AI tester with feedback-driven learning

      
Application Number 18901123
Grant Number 12405984
Status In Force
Filing Date 2024-09-30
First Publication Date 2025-09-02
Grant Date 2025-09-02
Owner Check Point Software Technologies, Ltd. (Israel)
Inventor
  • Kfir, Barak
  • Bardugo, Nofar
  • Karpati, Dan Eliezer
  • Sidgiyayev, Moisey
  • Root, Elena
  • Ahrak, Yotam

Abstract

A device, method, and system are provided for improving user interactions with large language models (LLMs) by enhancing user queries. User queries are enhanced by retrieving if/then pairs from a database that are related to the user query. The query is matched to related if statements stored in the database and the then statements of the matched if statements are included with the query to generate improved answers from the LLM.

IPC Classes  ?

  • G06F 16/00 - Information retrievalDatabase structures thereforFile system structures therefor
  • G06F 16/3349 - Reuse of stored results of previous queries

4.

DEEP LEARNING BASED BRAND RECOGNITION

      
Application Number 18399942
Status Pending
Filing Date 2023-12-29
First Publication Date 2025-07-03
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Spira, Yair David
  • Kozhukhov, Vladyslav
  • Livne, Dor

Abstract

A computer system and method are provided for generating a brand registry and classifying content as real or fake based on the brand registry. The brand registry is formed by generating a representation of brand content by encoding indicators found in brand content as a vector, identifying clusters in the encoded brand content as separate brands, and determining brand indicators for each brand. Unknown content is classified as real or fake brand content by encoding the unknown content, finding as the most similar brand the brand in the brand registry having a cluster centroid closest to the encoded unknown content, and comparing representative indicators for the unknown content to brand indicators for the most similar brand.

IPC Classes  ?

  • G06Q 30/0201 - Market modellingMarket analysisCollecting market data

5.

Autonomous network policy generator

      
Application Number 18401547
Grant Number 12407734
Status In Force
Filing Date 2023-12-31
First Publication Date 2025-07-03
Grant Date 2025-09-02
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Israel, Erez
  • Goldman, Lior
  • Katz, Natan

Abstract

A device, system, and method are provided for generating a network security policy automatically based on network traffic. The network security policy is generated by building a directional graph from the network traffic, with the nodes of the graph representing network end points, and the edges representing communication between two nodes on a communication channel. A feature vector is generated for each of the nodes and a graph neural network is applied to the feature vectors to generate output vectors. The output vectors are clustered using a cost function based on a weighted combination of a distance-based cost function and a network functionality cost function. The clusters generated from the output vectors are used to assign network security rules to each of the clusters.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04L 9/40 - Network security protocols

6.

AI-DRIVEN PLATFORM FOR API DIALOGUE

      
Application Number 18476480
Status Pending
Filing Date 2023-09-28
First Publication Date 2025-04-03
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Kfir, Barak
  • Havinson, Albert
  • Bardugo, Nofar
  • Karpati, Dan
  • Zegman, Tamir

Abstract

A system and method are provided for utilizing a service's Application Programming Interface (API) documentation, generating an OpenAPI specification for the API, enriching the OpenAPI specification with artificial intelligence (AI) generated explanatory notes, and integrating the enriched OpenAPI specification with an AI engine (e.g., a natural language model, large language model, etc.). This process may permit users to interact with the service through natural language.

IPC Classes  ?

7.

Security policy refactoring using AI

      
Application Number 18755973
Grant Number 12483535
Status In Force
Filing Date 2024-06-27
First Publication Date 2025-04-03
Grant Date 2025-11-25
Owner Check Point Software Technologies Ltd. (Israel)
Inventor
  • Kfir, Barak
  • Bardugo, Nofar
  • Karpati, Dan
  • Sandler, Eliyahu Hanokh
  • Zegman, Tamir

Abstract

A computer device (referred to as a processing engine), system, and method are provided for refactoring an original security policy using an artificial intelligence (AI) engine including a large language model (LLM). The processing engine parses policy data converts the original security policy into a code representation and sends the converted code representation to the AI engine. The AI engine analyzes the original security policy by applying the LLM to the code representation and identifies policy insights that are sent to the processing engine.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 40/205 - Parsing
  • G06F 40/30 - Semantic analysis
  • H04L 41/0894 - Policy-based network configuration management
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence

8.

Network user permission prediction

      
Application Number 18452627
Grant Number 12476977
Status In Force
Filing Date 2023-08-21
First Publication Date 2025-02-27
Grant Date 2025-11-18
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Shlomo, Yosef Ben
  • Joseph, Ori
  • Israel, Erez
  • Moreinis Adar, Eliya
  • Blumin, Arie

Abstract

A device and method for employing a machine learning model using processor circuitry to intelligently predict user permissions within a network environment and output a restriction recommendation for modifying user permissions.

IPC Classes  ?

9.

Network device classification

      
Application Number 18345214
Grant Number 12483575
Status In Force
Filing Date 2023-06-30
First Publication Date 2025-01-02
Grant Date 2025-11-25
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Elhelo, Amit
  • Zinkevich, Dmitry
  • Israel, Erez
  • Cohen-Sason, Daniel
  • Dadush, Ofek
  • Katz, Natan

Abstract

A device and method for classifying network devices based on their manufacturer (also referred to as vendor or brand) and function (e.g., printer, car, thermostat, etc.). This classification process utilizes a trained model that leverages parameters associated with the device's network activity as input.

IPC Classes  ?

  • H04L 29/00 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups
  • H04L 9/40 - Network security protocols

10.

DNS tunneling detection and prevention

      
Application Number 18148183
Grant Number 12411947
Status In Force
Filing Date 2022-12-29
First Publication Date 2024-07-04
Grant Date 2025-09-09
Owner Check Point Software Technologies Ltd. (Israel)
Inventor
  • Israel, Erez
  • Karpati, Dan
  • Shterenbaum, Eitan
  • Goldman, Lior

Abstract

Methods and devices are provided for differentiating between benign DNS data and malicious DNS data included in DNS traffic using an autoencoder. The autoencoder receives input DNS data and is trained to successfully encode the input DNS data when the input DNS data is benign DNS data and to fail to encode the input DNS data when the input DNS data is malicious DNS data. The autoencoder is trained using a modified loss function having a large weight when successfully encoding malicious DNS data.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

11.

Malicious VBA detection using graph representation

      
Application Number 18146092
Grant Number 12314390
Status In Force
Filing Date 2022-12-23
First Publication Date 2024-06-27
Grant Date 2025-05-27
Owner Check Point Software Technologies Ltd. (Israel)
Inventor
  • Livne, Dor
  • Duchovni, Avner
  • Israel, Erez
  • Katz, Natan
  • Abramzon, Michael

Abstract

A method and system are provided for detecting malicious code using graph neural networks. A call graph is created from the computer code by identifying functions in the computer code and vectorizing the identified functions using a stream of application programming interfaces (APIs) called by the functions and using tokens generated for the functions using a byte pair tokenizer. A trained graph neural network (GNN) and a trained attention neural network are applied to the call graph to generate an output graph with each node representing a function and each node assigned weights based on a probability distribution of the maliciousness of the corresponding function. A graph embedding is generated by calculating a weighted sum of the assigned weights and a trained deep neural network is applied to the graph embedding to generate a malicious score for the computer code identifying the computer code as malicious or benign.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 3/08 - Learning methods

12.

Phishing detection using HTML

      
Application Number 17936878
Grant Number 12155694
Status In Force
Filing Date 2022-09-30
First Publication Date 2024-04-04
Grant Date 2024-11-26
Owner Check Point Software Technologies Ltd. (Israel)
Inventor
  • Katz, Natan
  • Gozlan, Raphael Lior
  • Livne, Dor

Abstract

A device, system, and method are provided for detecting an email phishing attack by training graph neural network to detect phishing emails based on hypertext markup language (HTML) tags and cascading style sheets (CSS) included in an email. Noise is added during the training of the graph neural network to make the trained graph neural networks more robust against small changes in the training data.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 9/40 - Network security protocols
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence

13.

Techniques for securing services using inter-service visibility

      
Application Number 17818113
Grant Number 12289330
Status In Force
Filing Date 2022-08-08
First Publication Date 2024-02-08
Grant Date 2025-04-29
Owner Check Point Software Technologies Ltd. (Israel)
Inventor
  • Seltzer, Michael
  • Gelman, Aner
  • Gitelman, Shaked

Abstract

A system and method for securing software as a service (SaaS) platforms by providing inter-service visibility. A method includes identifying, based on log data of a first service, a second service connected to the first service, wherein each of the first service and the second service is a set of functions for performing a respective task, wherein the second service is called by the first service; identifying a plurality of patterns in communications between the first service and the second service in the log data of the first service; creating, based on the identified plurality of patterns, a baseline for communications between the first service and the second service; detecting an anomalous communication between the first service and the second service, wherein the anomalous communication deviates from the baseline; and performing a mitigation action with respect to the detected anomalous communication.

IPC Classes  ?

14.

Network traffic routing in an SD-WAN

      
Application Number 17811609
Grant Number 12316533
Status In Force
Filing Date 2022-07-11
First Publication Date 2024-01-11
Grant Date 2025-05-27
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Vainshtein, Tal
  • Raz, Ofer

Abstract

A method and network gateway are provided for routing network traffic between internet service providers (ISPs) based on dynamic communication quality of the ISPs. Dynamic communication quality of the ISPs are monitored and compared by processor circuitry of the network gateway. When a session-based connection is being transmitted on an ISP having dynamic communication quality that does not meet a required communication quality of the connection, the processor circuitry transitions the session-based connection to an ISP meeting the required communication quality of the connection.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • H04L 45/00 - Routing or path finding of packets in data switching networks
  • H04L 45/12 - Shortest path evaluation
  • H04L 45/302 - Route determination based on requested QoS
  • H04L 45/42 - Centralised routing

15.

METADATA BASED EFFICIENT PACKET PROCESSING

      
Application Number 17810856
Status Pending
Filing Date 2022-07-06
First Publication Date 2024-01-11
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor Markovitz, Oren

Abstract

A method and device are presented for decreasing processing cycles spent forwarding packets of a communication from receive queues to at least one transmit queue of a network interface controller. When received, packets are placed into a receive queue based on property(ies) of a leading packet. Buffer metadata including transmit information is associated with each communication. Processor circuitry transfers the packets from each of the receive queues to a transmit queue and the buffer metadata is used to determine how to transmit the packet and how to process the packet before transmission.

IPC Classes  ?

  • H04L 47/62 - Queue scheduling characterised by scheduling criteria
  • H04L 47/52 - Queue scheduling by attributing bandwidth to queues
  • H04L 49/90 - Buffering arrangements
  • H04L 49/901 - Buffering arrangements using storage descriptor, e.g. read or write pointers

16.

System and method for protecting against data storage attacks

      
Application Number 17703210
Grant Number 11960606
Status In Force
Filing Date 2022-03-24
First Publication Date 2023-10-12
Grant Date 2024-04-16
Owner Check Point Software Technologies Ltd. (Israel)
Inventor
  • Orevi, Liran
  • David, Haggai

Abstract

A system, method, and device are provided for detecting and mitigating a storage attack at the block level by generating canary blocks by marking blocks of data (referred to as memory blocks) such that other programs do not modify these canary blocks that are monitored to detect data storage attacks that attempt to modify the canary blocks and/or by monitoring statistical and behavioral features of activities over blocks, whether they can be modified by other programs or not. The system and method also backup the memory blocks by backing up memory blocks as they are modified. When a data storage attack is detected, the attack is stopped, and the files are remediated using the backup of the affected memory blocks.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

17.

Automatically mitigating potential service attacks based on learned usage impact patterns

      
Application Number 17685418
Grant Number 12010132
Status In Force
Filing Date 2022-03-03
First Publication Date 2023-09-07
Grant Date 2024-06-11
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor Pikarski, Rony

Abstract

Disclosed herein are systems and methods for automatically mitigating potential network services attacks based on service usage patterns learned using Machine Learning (ML) comprising, collecting operational data indicative of resource utilization of one or more network services serving a plurality of connections and of a plurality of operational factors of the plurality of connections, detecting degradation of the network service(s) based on analysis of the operational data, applying trained ML model(s) to the operational data in order to identify negative operational factor(s) of one or more suspected connections to the network service estimated to induce the degradation where the one or more ML model is trained to predict an impact pattern induced by each of a plurality of operational factors on the resource utilization of the one or more network services, and disconnecting, at least temporarily, the suspected connection(s) from the network service(s).

IPC Classes  ?

18.

CLOUDGUARD

      
Serial Number 98102058
Status Registered
Filing Date 2023-07-26
Registration Date 2025-12-30
Owner Check Point Software Technologies Ltd. (Israel)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computer hardware in the field of internet and network security; computer hardware with embedded recorded computer software for protecting and securing computer systems and networks; computer hardware for protecting and securing computer systems and networks; downloadable computer software for protecting and securing computer systems and networks; downloadable computer software for inspecting electronic files to detect and prevent computer security attacks, computer and email viruses, spam, spyware, adware and malware Software as a service (SAAS) services featuring software for protecting and securing computer systems and networks; providing online, non-downloadable software for protecting and securing computer systems and networks; computer security services, namely, providing computer and information technology security services through the cloud, for protecting data and information from unauthorized access and for detecting and preventing computer and email viruses, spam, spyware, adware and malware; providing online, non-downloadable software for inspecting electronic files to detect and prevent computer security attacks, computer and email viruses, spam, spyware, adware and malware

19.

Automatically generating security rules for a networked environment based on anomaly detection

      
Application Number 17548673
Grant Number 12238067
Status In Force
Filing Date 2021-12-13
First Publication Date 2023-06-15
Grant Date 2025-02-25
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor Pikarski, Rony

Abstract

A computer implemented method of automatically generating security rules for a networked environment based on anomalies identified using Machine Learning (ML), comprising receiving one or more feature vectors each comprising a plurality of operational parameters of a plurality of objects of a networked environment, identifying one or more anomaly patterns in the networked environment by applying one or more trained ML models to the one or more feature vectors trained to identify patterns deviating from normal behavior of the plurality of objects, parsing each anomaly patterns to a set of behavioral rules by traversing the anomaly pattern through a tree-like decision model, and generating one or more security rules for the networked environment according to the set(s) of behavior rules. Wherein the one or more security rules are applied to increase security of the networked environment.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence

20.

Method for generating, sharing and enforcing network profiles for IoT devices

      
Application Number 18163329
Grant Number 11968223
Status In Force
Filing Date 2023-02-02
First Publication Date 2023-06-08
Grant Date 2024-04-23
Owner Check Point Software Technologies Ltd. (Israel)
Inventor
  • Cohen-Sason, Daniel
  • Shamgar, Pini
  • Fabrikant, Yevgeny

Abstract

A method and system is provided for setting network policies based on electronic devices connected to a network. The electronic devices present on the network are detected and their behavior is captured using profiles. These profiles are then used to generate network policies based on the electronic devices connected to the network. Instead of reacting to behavior of the electronic devices (e.g., anomaly detection to detect malware), the method and system sets the network policies to prevent unauthorized communications (e.g., before malware is present in the system).

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/40 - Network security protocols
  • H04L 67/30 - Profiles

21.

Unification of data flows over network links with different internet protocol (IP) addresses

      
Application Number 18079036
Grant Number 11777718
Status In Force
Filing Date 2022-12-12
First Publication Date 2023-04-06
Grant Date 2023-10-03
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Bareket, Amit
  • Gidali, Sagi

Abstract

Provided herein are systems, devices and methods for opening a connection in a gateway of a cloud based network for a client device connected via two different network links to the gateway and to a Software Defined Perimeter (SDP) controller of a cloud based network. The SDP controller may receive a request from a client device to connect to a gateway of the cloud based network, generate a one-time SPA key for the client device (after authenticated), transmit the SPA key to the gateway, and transmit, via the first network link, the SPA key to the client device. The client device may transmit the SPA key to the gateway via the second network link and the gateway may be configured to open a connection for the client device via the second network link in case the SPA key is valid.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 69/164 - Adaptation or special uses of UDP protocol
  • H04L 12/66 - Arrangements for connecting between networks having differing types of switching systems, e.g. gateways

22.

Scalable and on-demand multi-tenant and multi region secure network

      
Application Number 17982561
Grant Number 11888815
Status In Force
Filing Date 2022-11-08
First Publication Date 2023-03-02
Grant Date 2024-01-30
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Bareket, Amit
  • Gidali, Sagi

Abstract

Provided herein are systems and methods for configuring a segmented cloud based network based on separate Internet Protocol (IP) segments, comprising receiving instructions to create one or more additional private virtual networks as respective additional segments in a multi-tenant multi-regional cloud based network segmented to a plurality of segments each mapped by a respective IP address range, calculating one or more non-conflicting new IP address range based on analysis of the IP address range of each of the segments, allocating a respective new IP address range to each additional segment, and deploying automatically one or more gateways. The gateways are configured to connect one or more client devices to the additional segment(s) by assigning each client device an IP address in the respective new IP address range and routing network packets between the client devices and the respective additional segment according to mapping of the respective new IP address range.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 45/02 - Topology update or discovery
  • H04L 12/66 - Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
  • H04L 61/5007 - Internet protocol [IP] addresses

23.

CHECK POINT

      
Application Number 018842092
Status Registered
Filing Date 2023-02-28
Registration Date 2023-09-19
Owner Check Point Software Technologies Ltd. (Israel)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 16 - Paper, cardboard and goods made from these materials
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Software and / or applications incorporated into computers and / or network systems used in data networks to control network traffic flow, establish trusted links over the network and / or Internet, prevent network attacks (as opposed to physical attacks and / or theft) and to integrate various technologies into a uniform network security policy sold primarily through value added resellers and system integrators, computer and network equipment providers, telecommunications and Internet service providers; excluding software and/or applications incorporated into machines and apparatus for use in currency exchange, cash dispensing and other financial transactions, automatic teller machines and parts and fitting therefor. Printed matter in the form of catalogs, brochures, instructional and technical manuals concerning computer software intended to protect computer systems from unauthorized access via computer networks, but excluding credit cards, debit cards, charge cards, top-up cards and money transfer cards. Design, implementation and maintenance of computer software for Internet service providers and telecommunications companies for managing network infrastructure, traffic management, IP management and for computer software to protect systems from unauthorized access.

24.

On-device protected DNS

      
Application Number 17462418
Grant Number 11489811
Status In Force
Filing Date 2021-08-31
First Publication Date 2022-11-01
Grant Date 2022-11-01
Owner Check Point Software Technologies Ltd. (Israel)
Inventor
  • Kfir, Barak
  • Sandler, Eliyahu Hanokh

Abstract

Methods and systems are provided for protecting DNS traffic locally on an electronic device (e.g., a smart phone) by capturing DNS traffic from network traffic transmitted from the device and ensuring the DNS traffic is routed to a trusted DNS server via a prescribed transmission protocol.

IPC Classes  ?

  • G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
  • H04L 61/5076 - Update or notification mechanisms, e.g. DynDNS
  • H04L 9/40 - Network security protocols
  • H04L 61/4511 - Network directoriesName-to-address mapping using standardised directoriesNetwork directoriesName-to-address mapping using standardised directory access protocols using domain name system [DNS]

25.

Systems and methods for the efficient detection of improperly redacted electronic documents

      
Application Number 17202471
Grant Number 11550934
Status In Force
Filing Date 2021-03-16
First Publication Date 2022-09-22
Grant Date 2023-01-10
Owner CHECK POINT SOFTWARE TECHNOLOGIES, LTD. (Israel)
Inventor Zegman, Tamir

Abstract

A method is provided for identifying improperly redacted information in documents. The documents are analyzed to detect redacted areas and text elements and to identify an intersection between a redacted area and a text element. When an area of the intersection is greater than an intersection threshold, the document is identified as containing improperly redacted information.

IPC Classes  ?

  • G06F 21/60 - Protecting data
  • G06F 40/117 - TaggingMarking up Designating a blockSetting of attributes
  • G06T 7/194 - SegmentationEdge detection involving foreground-background segmentation
  • G06T 7/149 - SegmentationEdge detection involving deformable models, e.g. active contour models
  • G06V 30/412 - Layout analysis of documents structured with printed lines or input boxes, e.g. business forms or tables
  • G06V 30/414 - Extracting the geometrical structure, e.g. layout treeBlock segmentation, e.g. bounding boxes for graphics or text

26.

Method for generating, sharing and enforcing network profiles for IoT devices

      
Application Number 17159615
Grant Number 11601459
Status In Force
Filing Date 2021-01-27
First Publication Date 2022-07-28
Grant Date 2023-03-07
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Cohen-Sason, Daniel
  • Shamgar, Pini
  • Fabrikant, Yevgeny

Abstract

A method and system is provided for setting network policies based on electronic devices connected to a network. The electronic devices present on the network are detected and their behavior is captured using profiles. These profiles are then used to generate network policies based on the electronic devices connected to the network. Instead of reacting to behavior of the electronic devices (e.g., anomaly detection to detect malware), the method and system sets the network policies to prevent unauthorized communications (e.g., before malware is present in the system).

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/40 - Network security protocols
  • H04L 67/30 - Profiles

27.

CHECK POINT

      
Application Number 1663325
Status Registered
Filing Date 2022-02-10
Registration Date 2022-02-10
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 16 - Paper, cardboard and goods made from these materials
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computer hardware and computer software in the field of internet and network security; computer software and hardware with embedded technology designed to protect and secure computer systems and networks; computer software for protecting and securing computer systems and networks; computer software for inspecting electronic files to detect and prevent computer security attacks, phishing, computer and email viruses, spam, spyware, adware and malware. Printed matter; instructional and technical manuals; datasheets; product documentation; training materials; catalogues; brochures. Provision of training; provision of training courses; provision of training programs in the field of cyber security; educational services; arranging of educational conferences; conducting of educational seminars; teaching; arranging and conducting of workshops, tutorials, seminars and conferences; arranging professional workshop and training courses; consultancy relating to arranging and conducting of training workshops; arranging and conducting of workshops and seminars in the field of internet and network security; providing of training and further training; personal development training; vocational training; providing of training and education; providing online training; providing online training seminars; providing online information in the field of training. Software as a service (SAAS) services featuring software for protecting and securing computer systems and networks; providing online, non-downloadable software for protecting and securing computer systems and networks; providing computer and information technology security services through the cloud; providing online, non-downloadable software for inspecting electronic files to detect and prevent computer security attacks, phishing, computer and email viruses, spam, spyware, adware and malware.

28.

Methods and system for packet control and inspection in containers and meshed environments

      
Application Number 17565491
Grant Number 11843614
Status In Force
Filing Date 2021-12-30
First Publication Date 2022-04-21
Grant Date 2023-12-12
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor Uriel, Ilan

Abstract

An instantiated application includes both a runtime instantiation of an application image, and an administrative service operable to install in the instantiated application at least one security module during runtime of the instantiated application in a container. Prior to runtime, a design time agent can access the application image in a repository, examine the application image, and based on the examining, adding at least one security module to the application image prior to instantiation. During runtime, a runtime agent can query parameters of the container, such as static and dynamic variables available on the machine on which the container is running. The runtime agent processes these parameters in conjunction with predefined rules to determine an action such as starting, stopping, adding, and/or changing the security module, such as the method of packet inspection.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 43/028 - Capturing of monitoring data by filtering
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

29.

System and method for performing automated security reviews

      
Application Number 17024787
Grant Number 11797685
Status In Force
Filing Date 2020-09-18
First Publication Date 2022-03-24
Grant Date 2023-10-24
Owner Check Point Software Technologies LTD. (Israel)
Inventor Uriel, Ilan

Abstract

An automated method executed by circuitry is provided for monitoring a software platform including multiple pods that manage, deploy, and execute micro services. The method uses monitoring pods at locations of interest in the software platform to label transactions that pass through the monitoring pods. The labels applied to the transactions are sent to a security program for review.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

30.

CHECK POINT

      
Application Number 218800200
Status Registered
Filing Date 2022-02-10
Registration Date 2025-03-05
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 16 - Paper, cardboard and goods made from these materials
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Computer hardware and computer software in the field of internet and network security; computer software and hardware with embedded technology designed to protect and secure computer systems and networks; computer software for protecting and securing computer systems and networks; computer software for inspecting electronic files to detect and prevent computer security attacks, phishing, computer and email viruses, spam, spyware, adware and malware. (2) Printed publications, namely course materials, manuals, precedents and case digests, books, newsletters, brochures, reference guides in the field cybersecurity; instruction materials in the field of cybersecurity; datasheets; product documentation in the field of cybersecurity; training materials in the field of cybersecurity; catalogues; brochures (1) Educational services, namely, development and provision of educational courses in the field of cybersecurity; provision of training programs in the field of cyber security; educational services in the form of seminars, webinars, conferences, and workshops in the field of cybersecurity; teaching programs in the field of cybersecurity; arranging and conducting of workshops, tutorials, seminars and conferences in the field of cybersecurity; arranging professional workshop and training courses in the field of cybersecurity; consultancy relating to arranging and conducting of training workshops in the field of cybersecurity; arranging and conducting of workshops and seminars in the field of internet and network security; arranging of training in the field of cybersecurity; providing of training in the fields of personal development and professional development; providing online training in the field of cybersecurity; providing online training seminars in the field of cybersecurity; providing online information in the field of cybersecurity trainings (2) Software as a service (SAAS) services featuring software for protecting and securing computer systems and networks; providing online, non-downloadable software for protecting and securing computer systems and networks; cloud services in the nature of monitoring of the condition and status of computer systems for security purposes; cloud services in the nature of monitoring of computer systems for detecting unauthorized access or data breach; cloud-based data protection services; cloud-based computer security services for the prevention and resolution of email and web-based cyberattacks; providing online, non-downloadable software for inspecting electronic files to detect and prevent computer security attacks, phishing, computer and email viruses, spam, spyware, adware and malware

31.

Implementing a multi-regional cloud based network using network address translation

      
Application Number 16988658
Grant Number 11271899
Status In Force
Filing Date 2020-08-09
First Publication Date 2022-02-10
Grant Date 2022-03-08
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Bareket, Amit
  • Gidali, Sagi

Abstract

Provided herein are systems, devices and methods for applying address translation to network traffic originating from client devices having dynamic Internet Protocol (IP) addresses to support IP based security measures using a gateway configured to connect a plurality of client devices used by a plurality of users to a plurality of cloud based networks. The gateway may receive, from a client device assigned a dynamic IP address, credentials of a user using the respective client device, access a translation record mapping the user, identified by his credentials, to a respective unique static IP address, adjust a source address of each packet received from the client device to include the static IP address, and forward each adjusted packet to a security engine configured to apply security policy(s) to each adjusted packet before transmitting it to the cloud based network(s). The security policy(s) is applied according to the static IP address.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • H04L 61/2503 - Translation of Internet protocol [IP] addresses
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/66 - Arrangements for connecting between networks having differing types of switching systems, e.g. gateways

32.

Unification of data flows over network links with different internet protocol (IP) addresses

      
Application Number 16988662
Grant Number 11558184
Status In Force
Filing Date 2020-08-09
First Publication Date 2022-02-10
Grant Date 2023-01-17
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Bareket, Amit
  • Gidali, Sagi

Abstract

Provided herein are systems, devices and methods for opening a connection in a gateway of a cloud based network for a client device connected via two different network links to the gateway and to a Software Defined Perimeter (SDP) controller of a cloud based network. The SDP controller may receive a request from a client device to connect to a gateway of the cloud based network, generate a one-time SPA key for the client device (after authenticated), transmit the SPA key to the gateway, and transmit, via the first network link, the SPA key to the client device. The client device may transmit the SPA key to the gateway via the second network link and the gateway may be configured to open a connection for the client device via the second network link in case the SPA key is valid.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 69/164 - Adaptation or special uses of UDP protocol
  • H04L 12/66 - Arrangements for connecting between networks having differing types of switching systems, e.g. gateways

33.

Scalable and on-demand multi-tenant and multi region secure network

      
Application Number 16988777
Grant Number 11502993
Status In Force
Filing Date 2020-08-10
First Publication Date 2022-02-10
Grant Date 2022-11-15
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Bareket, Amit
  • Gidali, Sagi

Abstract

Provided herein are systems and methods for configuring a segmented cloud based network based on separate Internet Protocol (IP) segments, comprising receiving instructions to create one or more additional private virtual networks as respective additional segments in a multi-tenant multi-regional cloud based network segmented to a plurality of segments each mapped by a respective IP address range, calculating one or more non-conflicting new IP address range based on analysis of the IP address range of each of the segments, allocating a respective new IP address range to each additional segment, and deploying automatically one or more gateways. The gateways are configured to connect one or more client devices to the additional segments) by assigning each client device an IP address in the respective new IP address range and routing network packets between the client devices and the respective additional segment according to mapping of the respective new IP address range.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/66 - Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
  • H04L 12/715 - Hierarchical routing, e.g. clustered networks or inter-domain routing
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal
  • H04L 9/40 - Network security protocols
  • H04L 45/02 - Topology update or discovery
  • H04L 61/5007 - Internet protocol [IP] addresses

34.

CHECK POINT

      
Serial Number 79341340
Status Registered
Filing Date 2022-02-10
Registration Date 2023-12-05
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 16 - Paper, cardboard and goods made from these materials
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computer hardware for use in the field of internet and network security; Downloadable or recorded computer software for protection, detection, and prevention of threats in the field of Internet and network security; Downloadable or recorded computer software for protecting and securing computer systems and networks; Downloadable or recorded computer software for protecting and securing computer systems and networks; Computer hardware with embedded technology designed to protect and secure computer systems and networks; Downloadable or recorded computer software for inspecting electronic files to detect and prevent computer security attacks, phishing, computer and email viruses, spam, spyware, adware and malware Printed matter, namely, paper signs and manuals in the field of cyber security; Printed matter, namely, instructional and technical manuals in the field of cyber security; Printed matter, namely, datasheets in the field of cyber security; Printed matter, namely, product documentation in the nature of informational product flyers in the field of cyber security; Printed training materials in the field of cyber security; Printed catalogues in the field of cyber security; Printed brochures about cyber security Training services, namely, provision of training in the field of cyber security; Provision of training courses, namely, arranging and conducting of training courses in the field of cyber security; Provision of training programs, namely, arranging and conducting of training programs in the field of cyber security; Educational services, namely, providing classes, seminars, non-downloadable webinars and workshops in the field of cyber security; Arranging of educational conferences in the field of cyber security; Conducting of educational seminars in the field of cyber security; Teaching in the field of cyber security; Arranging and conducting of workshops, tutorials, seminars and conferences in the field of cyber security; Arranging professional workshop and training courses in the field of cyber security; Providing of training and further training in the field of cyber security ; Training services in the field of personal development; Vocational training, namely, vocational education in the field of cyber security; Educational services, namely, providing of training and education classes in the field of cyber security; Providing online training courses, workshops in the field of cyber security; Providing online training seminars in the field of cyber security; Providing online information in the field of cyber security training Software as a service (SAAS) services featuring software for protecting and securing computer systems and networks; providing online, non-downloadable software for protecting and securing computer systems and networks; Computer security services, namely, providing computer and information technology security services through the cloud in the nature of access control, policy management, threat detection, threat prevention, security forensics, machine learning visualization, misconfiguration detection, and enforcement of security best practices and compliance frameworks; providing online, non-downloadable software for inspecting electronic files to detect and prevent computer security attacks, phishing, computer and email viruses, spam, spyware, adware and malware

35.

System and method to detect and prevent Phishing attacks

      
Application Number 17227324
Status Pending
Filing Date 2021-04-11
First Publication Date 2021-07-29
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Dahan, Meir Jonathan
  • Drihem, Lior
  • Perlmutter, Amnon
  • Tam, Ofir

Abstract

Detecting and preventing phishing attacks in real-time features protection of users from feeding sensitive data to phishing sites, educating users for theft awareness, and protecting enterprise credentials. A requested document traversing a gateway is embedded with a detection module. When a user accesses the document, the embedded detection module is executed in the context of the document, checks if the document is prompting the user for sensitive information, determining if the document is part of a phishing attack, and initiates mitigation, warning, and/or education techniques.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

36.

Methods and system for packet control and inspection in containers and meshed environments

      
Application Number 16503515
Grant Number 11431732
Status In Force
Filing Date 2019-07-04
First Publication Date 2021-01-07
Grant Date 2022-08-30
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor Uriel, Ilan

Abstract

An instantiated application includes both a runtime instantiation of an application image, and an administrative service operable to install in the instantiated application at least one security module during runtime of the instantiated application in a container. Prior to runtime, a design time agent can access the application image in a repository, examine the application image, and based on the examining, adding at least one security module to the application image prior to instantiation. During runtime, a runtime agent can query parameters of the container, such as static and dynamic variables available on the machine on which the container is running. The runtime agent processes these parameters in conjunction with predefined rules to determine an action such as starting, stopping, adding, and/or changing the security module, such as the method of packet inspection.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 43/028 - Capturing of monitoring data by filtering
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

37.

Method and system for detecting and classifying malware based on families

      
Application Number 16387642
Grant Number 11321453
Status In Force
Filing Date 2019-04-18
First Publication Date 2020-10-22
Grant Date 2022-05-03
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Kosarev, Ivan
  • Finkelstein, Lotem

Abstract

Methods and systems utilizing sandbox outputs for files, such as dynamic file analysis (DFA) reports, regardless of size, to automatically create rules. From these rules, the maliciousness of the file is determined, and if the file is malicious, i.e., malware, the malware is classified into malware families.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06N 7/02 - Computing arrangements based on specific mathematical models using fuzzy logic
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

38.

Methods and systems for identifying malware enabled by automatically generated domain names

      
Application Number 16896315
Grant Number 11606375
Status In Force
Filing Date 2020-06-09
First Publication Date 2020-09-24
Grant Date 2023-03-14
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor Chailytko, Aliaksandr

Abstract

Computerized methods and systems identify malware enabled by automatically generated domain names. An agent executes a malware, in a controlled environment, at a first temporal input value and a second temporal input value. A first set of domain names is generated in response to the execution at the first temporal input value. A second set of domain names is generated in response to the execution at the second temporal input value. The agent compares the first set of domain names with the second set of domain names to produce a comparison output metric.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal
  • H04L 9/40 - Network security protocols
  • H04L 61/3015 - Name registration, generation or assignment
  • H04L 61/4511 - Network directoriesName-to-address mapping using standardised directoriesNetwork directoriesName-to-address mapping using standardised directory access protocols using domain name system [DNS]

39.

Method and system for reducing false positives in web application firewalls

      
Application Number 16288171
Grant Number 11075882
Status In Force
Filing Date 2019-02-28
First Publication Date 2020-09-03
Grant Date 2021-07-27
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor Barda, Roy

Abstract

Computerized methods and systems reduce the false positive rate of Web Application Firewalls (WAFs), by operating automatically and utilizing system defined “trusted sources”.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

40.

Method for performing TLS/SSL inspection based on verified subject name

      
Application Number 16226661
Grant Number 11411924
Status In Force
Filing Date 2018-12-20
First Publication Date 2020-06-25
Grant Date 2022-08-09
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Isaev, Pavel
  • Sayag, Idan
  • Volodin, Alexey
  • Zegman, Tamir

Abstract

Methods and systems for processing cryptographically secured connections by a gateway, between a client and a server, are performed. Upon receiving TCP and TLS/SSL handshakes associated with a client side connection, from a client (client computer) to the gateway, a probing connection is established. The probing connection completes the handshakes, and based on the completion of the handshakes, the gateway renders a decision, to bypass, block or inspect, the connections between the client and the server, allowing or not allowing data to pass through the connections between the client and the server.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

41.

Online assets continuous monitoring and protection

      
Application Number 16316574
Grant Number 11960604
Status In Force
Filing Date 2017-07-09
First Publication Date 2020-04-23
Grant Date 2024-04-16
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor Priel, Shay

Abstract

The present invention relates to a method and system for monitoring webpages for detecting malicious contents. According to a preferred embodiment the method comprises A) providing a plurality of URLs provided by a subscriber, employing a crawler to visit a URL webpage of said plurality of URLs; B) retrieving an object from said URL webpage by said crawler; C) analyzing said object retrieved by said crawler from said URL webpage, and determining whether said object retrieved is malicious or not; and D) alerting the subscriber, when said retrieved object is deemed malicious. According to one embodiment, the method further comprises E) employing a crawler to visit a URL webpage of a following URL of the plurality of URLs, when the determination of step C) is deemed not malicious; and F) returning to step B).

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 16/951 - IndexingWeb crawling techniques
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

42.

Method and system for modeling all operations and executions of an attack and malicious process entry

      
Application Number 16571118
Grant Number 10972488
Status In Force
Filing Date 2019-09-15
First Publication Date 2020-03-12
Grant Date 2021-04-06
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Pal, Anandabrata
  • Arzi, Lior
  • Leiderfarb, Tamara

Abstract

Computerized methods and systems determine an entry point or source of an attack on an endpoint, such as a machine, e.g., a computer, node of a network, system or the like. These computerized methods and systems utilize an attack execution/attack or start root, to build an attack tree, which shows the attack on the end point and the damage caused by the attack, as it propagates through the machine, network, system, or the like.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

43.

Method and system for detecting kernel corruption exploits

      
Application Number 16571341
Grant Number 10810309
Status In Force
Filing Date 2019-09-16
First Publication Date 2020-01-09
Grant Date 2020-10-20
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Frank, Dani
  • Alon, Yoav
  • Gafni, Aviv
  • Omelchenko, Ben

Abstract

Methods and systems provide for detecting exploitation of kernel vulnerabilities which typically corrupt memory. The methods and systems are implemented, for example, via a host, which includes a hypervisor, which controls the operating system (OS) user space and the OS kernel space.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/48 - Program initiatingProgram switching, e.g. by interrupt
  • G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure

44.

Digital MDR (managed detection and response) analysis

      
Application Number 16489793
Grant Number 11615326
Status In Force
Filing Date 2018-03-05
First Publication Date 2020-01-02
Grant Date 2023-03-28
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Priel, Shay
  • Ikar, Noam

Abstract

A method for detecting an occurrence of an online event including retrieving a data item from online sources; forming a list by tagging words and/or strings within the data item according to predefined attributes such that the list includes the words and/or strings with their corresponding attributes; forming sequence items relating to the list according to a predefined criterion such that each sequence item includes at least the list and optionally additional preformed lists that have been formed in the same manner as the list and that have a shared concept with the list according to the predefined criterion; running each of the sequence items in a preformed machine learning classifying model that outputs a determination if there is an occurrence of the online event or not. The present invention further relates to generating the machine learning classifying model. The present invention also relates to a corresponding system.

IPC Classes  ?

  • G06N 5/04 - Inference or reasoning models
  • G06N 20/20 - Ensemble learning
  • G06N 20/10 - Machine learning using kernel methods, e.g. support vector machines [SVM]
  • G06F 16/951 - IndexingWeb crawling techniques
  • G06F 40/279 - Recognition of textual entities
  • G06N 3/04 - Architecture, e.g. interconnection topology
  • G06N 7/00 - Computing arrangements based on specific mathematical models

45.

On-device network protection

      
Application Number 16012792
Grant Number 10911487
Status In Force
Filing Date 2018-06-20
First Publication Date 2019-12-26
Grant Date 2021-02-02
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Kfir, Barak
  • Raban, Yuval
  • Berengoltz, Pavel

Abstract

Methods performed by a system on a computer device, such as a smart phone, i.e., locally, for protecting against network-based attacks. These methods inspect all traffic to every application and web browser on the device.

IPC Classes  ?

  • G06F 12/14 - Protection against unauthorised use of memory
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

46.

DOME9

      
Application Number 198623200
Status Registered
Filing Date 2019-09-20
Registration Date 2024-08-30
Owner Check Point Software Technologies Ltd. (Israel)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Computer hardware and computer software in the field of internet and network security; computer software and technology embedded in hardware designed to protect and secure computer systems and networks; computer software for protecting and securing computer systems and networks; computer software for inspecting electronic files to detect and prevent computer security attacks, computer and email viruses, spam, spyware, adware and malware (1) Software as a service (SAAS) services featuring software for protecting and securing computer systems and networks; providing online, non-downloadable software for protecting and securing computer systems and networks; cloud-based computer security services for the prevention and resolution of email and webbased cyberattacks; providing online, nondownloadable software for inspecting electronic files to detect and prevent computer security attacks, computer and email viruses, spam, spyware, adware and malware

47.

Anti-malware detection and removal systems and methods

      
Application Number 16292352
Grant Number 10567425
Status In Force
Filing Date 2019-03-05
First Publication Date 2019-06-27
Grant Date 2020-02-18
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Shaulov, Michael
  • Bobrov, Ohad

Abstract

An anti-malware system including at least one database, remote from a plurality of computers to be protected, which stores identification of computer applications resident on the computers to be protected and an application-specific communications footprint for the computer applications, and at least one server, remote from the plurality of computers to be protected, and being operative to calculate a reference computer-specific communications composite pattern based on multiple application-specific communications footprints for applications installed on the computers to be protected, calculate a current computer-specific communications composite pattern based on actual communications of at least one the plurality of computers to be protected, and provide an alert when the current computer-specific communications composite pattern of the at least one of the plurality of computers to be protected differs from the reference computer-specific communications composite pattern of the at least one of the plurality of computers to be protected.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

48.

Cloud security assessment system using near-natural language compliance rules

      
Application Number 16194727
Grant Number 10979457
Status In Force
Filing Date 2018-11-19
First Publication Date 2019-06-20
Grant Date 2021-04-13
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor Feintuch, Roy

Abstract

A cloud security assessment (CSA) system configured to identify and remedy a workflow executing in a cloud web service environment is provided. The CSA system includes a network interface configured to connect the CSA system to the cloud web service environment, wherein the cloud web service environment is defined by a cloud account; and a processor in operative communication with the cloud web service environment configured to receive a cloud account compliance rule for the cloud account in a structured near natural language, the compliance rule being applied by the CSA system on at least an instance of the cloud web service environment, wherein is processor is further configured to perform a remediation action based on a policy of the cloud account upon determination of a violation of the compliance rule.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

49.

Method to identify users behind a shared VPN tunnel

      
Application Number 15787781
Grant Number 11323426
Status In Force
Filing Date 2017-10-19
First Publication Date 2019-04-25
Grant Date 2022-05-03
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Perlmutter, Amnon
  • Drihem, Lior
  • Ziv, Yair
  • Sinai, Jeremy
  • Mizrachi, Tsemach

Abstract

Transparently identifying users using a shared VPN tunnel uses an innovative method to detect a user of a shared VPN tunnel, after authenticating the user, using an assigned userid (that may be a virtual IP). The virtual IP is used as a cookie in each request made by the user. This cookie is an authentication token used by the gateway to detect the user behind a specific request for an Internet resource (such as an http/s request). The cookie is stripped by the gateway so the cookie is not sent to the resource.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

50.

Method and system for detecting and remediating polymorphic attacks across an enterprise

      
Application Number 16181377
Grant Number 10511616
Status In Force
Filing Date 2018-11-06
First Publication Date 2019-03-07
Grant Date 2019-12-17
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Leiderfarb, Tamara
  • Arzi, Lior
  • Pal, Anandabrata

Abstract

Disclosed are methods and systems for detecting malware and potential malware based on using generalized attack trees (generalized attack tree graphs). The generalized attack trees are based on attack trees (attack tree graphs), whose objects, such as links and vertices, have been analyzed, and some of these objects have been generalized, resulting in the generalized attack tree of the invention.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

51.

Methods and systems for identifying malware enabled by automatically generated domain names

      
Application Number 15677084
Grant Number 10728266
Status In Force
Filing Date 2017-08-15
First Publication Date 2019-02-21
Grant Date 2020-07-28
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor Chailytko, Aliaksandr

Abstract

Computerized methods and systems identify malware enabled by automatically generated domain names. An agent executes a malware, in a controlled environment, at a first temporal input value and a second temporal input value. A first set of domain names is generated in response to the execution at the first temporal input value. A second set of domain names is generated in response to the execution at the second temporal input value. The agent compares the first set of domain names with the second set of domain names to produce a comparison output metric.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal

52.

Account take over prevention

      
Application Number 15470951
Grant Number 10645074
Status In Force
Filing Date 2017-03-28
First Publication Date 2018-10-04
Grant Date 2020-05-05
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Boxiner, Alon
  • Mizrachi, Liad
  • Vanunu, Oded
  • Zaikin, Roman
  • Daniely, Yoav Shay

Abstract

A method for monitoring access of users to Internet SaaS applications includes the CISO (company Internet security office) in the configuration and operation of the method, instead of relying only on whatever security the SaaS application implements. Certificates, not accessible to users, are pushed to a user's client. When an access request is received from a client by an application, a gateway requests from the client the certificate. After a notification and approval process with the user, a received certificate is verified, user access to the application is allowed or denied, and the CISO notified of the attempted access.

IPC Classes  ?

  • H04L 29/00 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

53.

Key exchange and mutual authentication in low performance devices

      
Application Number 15473656
Grant Number 10243741
Status In Force
Filing Date 2017-03-30
First Publication Date 2018-10-04
Grant Date 2019-03-26
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Cohen, Yiftach
  • Geva, Erez

Abstract

Securely exchanging keys to establish secure connections to low powered connected devices (LPCDs), such as smart devices and IoT (Internet Of Things) devices, and mutual authentication between these devices and third party controllers is accomplished via a higher performance machine configured with a dedicated remote service (DRS). A known symmetric pre-shared key (PSK) is used to establish a secure first connection between the LPCD and the DRS using another symmetric key. The DRS can then use asymmetric key exchange to securely send a new symmetric key to the 3P, and send the same new symmetric key to the LPCD using the secure first connection. This facilitates LPCDs to securely establish secure communications with other devices, in particular for control by third party (3P) devices. This also allows authentication of the LPCD with cloud services, and enables a DRS to vouch for associated devices to other DRSs.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04W 12/06 - Authentication
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • G06F 21/44 - Program or device authentication

54.

Method and system for detecting kernel corruption exploits

      
Application Number 15473654
Grant Number 10467407
Status In Force
Filing Date 2017-03-30
First Publication Date 2018-10-04
Grant Date 2019-11-05
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Frank, Dani
  • Alon, Yoav
  • Gafni, Aviv
  • Omelchenko, Ben

Abstract

Methods and systems provide for detecting exploitation of kernel vulnerabilities which typically corrupt memory. The methods and systems are implemented, for example, via a host, which includes a hypervisor, which controls the operating system (OS) user space and the OS kernel space.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/48 - Program initiatingProgram switching, e.g. by interrupt
  • G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure

55.

Automatic establishment of a VPN connection over unsecure wireless connection

      
Application Number 15415991
Grant Number 10440762
Status In Force
Filing Date 2017-01-26
First Publication Date 2018-07-26
Grant Date 2019-10-08
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Bareket, Amit
  • Gidali, Sagi

Abstract

System and method for automatically establishing a Virtual Private Network (VPN) link between a mobile device and a VPN server over an unsecure wireless network, comprising, at the mobile device, detecting an attempt to establish a wireless connection to the internet via an unsecure wireless network, probing the unsecure wireless network to determine accessibility over the unsecure wireless network to a VPN server, automatically initializing, based on the determination, a VPN client, the VPN client executed to establishes a VPN link between the mobile device and the VPN server over the unsecure wireless network, directing network traffic of the mobile device through the VPN link and automatically terminating the VPN client when the mobile device disconnects from the unsecure wireless network.

IPC Classes  ?

  • H04W 76/12 - Setup of transport tunnels
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 76/30 - Connection release
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/46 - Interconnection of networks
  • H04W 12/10 - Integrity
  • H04W 12/00 - Security arrangementsAuthenticationProtecting privacy or anonymity
  • H04W 40/24 - Connectivity information management, e.g. connectivity discovery or connectivity update

56.

Method and system for injecting javascript into a web page

      
Application Number 15272452
Grant Number 10728274
Status In Force
Filing Date 2016-09-22
First Publication Date 2018-03-22
Grant Date 2020-07-28
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Uriel, Ilan
  • Mor, Aviad

Abstract

Computerized methods and systems inspect data packets received from a web server for the presence of a value from a list of prohibited values. If a prohibited value is absent, a gateway injects at least one JavaScript code segment for execution by a web browser. The at least one JavaScript code segment includes a plurality of JavaScript functions which include at least one security analysis JavaScript function and a plurality of modified JavaScript functions. Each of the modified JavaScript functions is created from a respective native JavaScript function to include at least one code segment that when executed inspects for at least one of: a dynamic modification of at least one JavaScript function from a prohibited list of JavaScript functions, a dynamic creation of at least one JavaScript function from the prohibited list of JavaScript functions, or a dynamic reference to a value from the list of prohibited values.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

57.

Push based encryption

      
Application Number 15197783
Grant Number 10554629
Status In Force
Filing Date 2016-06-30
First Publication Date 2018-01-04
Grant Date 2020-02-04
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Raban, Yuval
  • Goshmir, Nadia
  • Reshtik, Shami

Abstract

A method for introducing a replacement code segment over-the-air through a wireless mobile communication network to an existing code resident on a mobile terminal: identifying the mobile terminal from among terminals served through the wireless mobile communication network; sending a push notification through the network to the mobile terminal, the push notification indicative of the replacement code segment ready for downloading; activating a dynamic update module resident in the mobile terminal, in response to the push notification; sending a request for the replacement code segment; downloading the replacement code segment to the mobile terminal; and transferring the downloaded replacement code segment to the dynamic update module for dynamic replacement of a corresponding old code segment within the mobile terminal with the replacement code segment, obviating a need to recompile the existing code.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 9/16 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

58.

Method and system for creating and receiving neutralized data items

      
Application Number 15177352
Grant Number 10382493
Status In Force
Filing Date 2016-06-09
First Publication Date 2017-12-14
Grant Date 2019-08-13
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Finchelstein, Daniel
  • Perlmutter, Amnon

Abstract

Computerized methods and systems receive neutralized data items on a first entity from a second entity over a network by receiving a first data item from the second entity. A security protocol that applies rules and policies is applied to the first data item to create a second data item that is a neutralized version of the first data item. The first data item and the second data item are converted into comparable forms. The second data item is analyzed against the first data item by comparing the comparable forms to form at least one comparison measure. The second data item is received on the endpoint if the at least one comparison measure satisfies a threshold criterion. The security protocol is modified to adjust the applied rules and policies if the at least one comparison measure does not satisfy the threshold criterion.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 16/18 - File system types

59.

Method and system for mitigating the effects of ransomware

      
Application Number 15144847
Grant Number 09888032
Status In Force
Filing Date 2016-05-03
First Publication Date 2017-11-09
Grant Date 2018-02-06
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Dekel, Kasif
  • Mizrachi, Liad
  • Zaikin, Roman
  • Vanunu, Oded

Abstract

Computerized methods and systems mitigate the effect of a ransomware attack on an endpoint by detecting access events associated with requests by processes, including ransomware processes, to access data items on the endpoint. The data items are hidden from the operating system processes executed on the endpoint. In response to detecting an access event, an action is taken against the process associated with the access event.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/60 - Protecting data

60.

Method and system for destroying browser-based memory corruption vulnerabilities

      
Application Number 15594680
Grant Number 10050995
Status In Force
Filing Date 2017-05-15
First Publication Date 2017-08-31
Grant Date 2018-08-14
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Teller, Tomer
  • Hayon, Adi

Abstract

Client-less methods and systems destroy/break the predictive layout of, for example, a client computer memory. The methods and systems operate by injecting a library that manipulates the client computer memory during exploitation attempts.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

61.

Method and system for transparently manipulating downloaded files

      
Application Number 14979569
Grant Number 10567468
Status In Force
Filing Date 2015-12-28
First Publication Date 2017-06-29
Grant Date 2020-02-18
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Perlmutter, Amnon
  • Drihem, Lior

Abstract

Methods and systems provide mechanisms for inspection devices, such as firewalls and servers and computers associated therewith, to selectively manipulate files, for which a download has been requested. The manipulation is performed in a manner which is transparent to the requesting user.

IPC Classes  ?

  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

62.

Method and system for detecting and remediating polymorphic attacks across an enterprise

      
Application Number 15373482
Grant Number 10193906
Status In Force
Filing Date 2016-12-09
First Publication Date 2017-06-15
Grant Date 2019-01-29
Owner CHECKPOINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Leiderfarb, Tamara
  • Arzi, Lior
  • Pal, Anandabrata

Abstract

Disclosed are methods and systems for detecting malware and potential malware based on using generalized attack trees (generalized attack tree graphs). The generalized attack trees are based on attack trees (attack tree graphs), whose objects, such as links and vertices, have been analyzed, and some of these objects have been generalized, resulting in the generalized attack tree of the invention.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

63.

System and method for determining summary events of an attack

      
Application Number 15372423
Grant Number 10291634
Status In Force
Filing Date 2016-12-08
First Publication Date 2017-06-15
Grant Date 2019-05-14
Owner CHECKPOINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Arzi, Lior
  • Pal, Anandabrata
  • Leiderfarb, Tamara

Abstract

Computerized methods and systems determine summary events from an attack on an endpoint. The detection and determination of these summary events is performed by a machine, e.g., a computer, node of a network, system or the like.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

64.

Method and system for identifying uncorrelated suspicious events during an attack

      
Application Number 15292169
Grant Number 10462160
Status In Force
Filing Date 2016-10-13
First Publication Date 2017-06-15
Grant Date 2019-10-29
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Arzi, Lior
  • Leiderfarb, Tamara
  • Pal, Anandabrata

Abstract

Computerized methods and systems identify events associated with an attack initiated on an endpoint client. A listing of processes executed or created on the endpoint during the attack is obtained. The listing of processes includes a first process and at least one subsequent process executed or created by the first process. The computerized methods and systems analyze for the occurrence of at least one event during a time interval associated with the attack. The computerized methods and systems determine whether the listing of processes includes a process that when executed caused the occurrence of the at least one event. If the listing of processes excludes process that when executed caused the occurrence of the at least one event, the at least one event and the causing process are stored, for example, in a database or memory.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

65.

Method and system for determining initial execution of an attack

      
Application Number 14963265
Grant Number 10880316
Status In Force
Filing Date 2015-12-09
First Publication Date 2017-06-15
Grant Date 2020-12-29
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Pal, Anandabrata
  • Leiderfarb, Tamara
  • Arzi, Lior

Abstract

Computerized methods and systems determine an initial execution of an attack on an endpoint. An indicator of the attack is obtained by analysis of a first process on the endpoint. A sequence of processes that includes the first process associates the initial execution of the attack with the first process. Each respective process in the sequence of processes is created or executed by at least one of the initial execution or a process in the sequence of processes. The initial execution is identified based on linking from the first process to the initial execution through a combination of executions and creations of the processes in the sequence of processes.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 9/448 - Execution paradigms, e.g. implementations of programming paradigms
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 9/445 - Program loading or initiating

66.

Method and system for modeling all operations and executions of an attack and malicious process entry

      
Application Number 14963267
Grant Number 10440036
Status In Force
Filing Date 2015-12-09
First Publication Date 2017-06-15
Grant Date 2019-10-08
Owner CHECKPOINT SOFTWARE TECHNOLOGIES LTD (Israel)
Inventor
  • Pal, Anandabrata
  • Arzi, Lior
  • Leiderfarb, Tamara

Abstract

Computerized methods and systems determine an entry point or source of an attack on an endpoint, such as a machine, e.g., a computer, node of a network, system or the like. These computerized methods and systems utilize an attack execution/attack or start root, to build an attack tree, which shows the attack on the end point and the damage caused by the attack, as it propagates through the machine, network, system, or the like.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

67.

On-demand authorization of access to protected resources

      
Application Number 15165670
Grant Number 10616235
Status In Force
Filing Date 2016-05-26
First Publication Date 2017-05-25
Grant Date 2020-04-07
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Alon, Zohar
  • Feintuch, Roy
  • Fingold, Eyal

Abstract

A method and system for on-demand authorization of access to protected resources are presented. The method comprises associating a primary user device with at least one secondary user device, the primary device having access privileges at a first degree of privilege; changing any access privileges assigned to the primary user device for accessing protected resources to a lesser degree of privilege; and reinstating the access privileges of the primary user device to the first degree of privilege, upon receiving a verification message from the at least one secondary user device.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

68.

Web injection protection method and system

      
Application Number 14881180
Grant Number 11165820
Status In Force
Filing Date 2015-10-13
First Publication Date 2017-04-13
Grant Date 2021-11-02
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Vanunu, Oded
  • Mizrachi, Liad

Abstract

Computerized methods and systems detect unauthorized and potentially malicious, as well as malicious records, typically in the form of electronic forms, such as those where users input information (into input blocks or fields), such as bank and financial institution electronic forms and the like. Should such an unauthorized form, be detected, the detection causes the taking of protective action by the computer whose on whose browser the unauthorized form has been rendered.

IPC Classes  ?

  • G06F 12/14 - Protection against unauthorised use of memory
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 16/22 - IndexingData structures thereforStorage structures
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures

69.

Protection of communication on a vehicular network via a remote security service

      
Application Number 14738935
Grant Number 09686294
Status In Force
Filing Date 2015-06-15
First Publication Date 2016-12-15
Grant Date 2017-06-20
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Kantor, Alon
  • Zegman, Tamir

Abstract

Methods and systems for protecting components of a linked vehicle from cyber-attack are disclosed. These methods and systems comprise elements of hardware and software for receiving a packet; tunneling the packet to a terrestrial-based security service, analyzing whether the packet is harmful to a component in the vehicle, and at least one action to protect at least one component.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

70.

Detection of potentially malicious web content by emulating user behavior and user environment

      
Application Number 14708248
Grant Number 10567395
Status In Force
Filing Date 2015-05-10
First Publication Date 2016-11-10
Grant Date 2020-02-18
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Gafni, Aviv
  • Omelchenko, Ben
  • Zegman, Tamir

Abstract

Methods and systems for the detection of receipt of potentially malicious web content by a web clients are disclosed. These methods and systems comprise elements of hardware and software for obtaining a sandbox environment on a server, wherein the sandbox is configured according to the system characteristics of the client device, emulating web requests and responses of the web client in the sandbox; and analyzing the behavior of components in the sandbox during processing of received web content.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

71.

Method for protection of automotive components in intravehicle communication system

      
Application Number 14673887
Grant Number 09661006
Status In Force
Filing Date 2015-03-31
First Publication Date 2016-10-06
Grant Date 2017-05-23
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Kantor, Alon
  • Zegman, Tamir

Abstract

Methods and systems for mitigating cyber attacks on components of an automotive communication system are disclosed. These methods and systems comprise elements of hardware and software for receiving a frame; determining whether the frame potentially affects correct operation of an automotive component; and, taking protective action.

IPC Classes  ?

  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 21/60 - Protecting data
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

72.

Method and system for modifying HTTP request headers without terminating the connection

      
Application Number 14675775
Grant Number 10057390
Status In Force
Filing Date 2015-04-01
First Publication Date 2016-10-06
Grant Date 2018-08-21
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Perlmutter, Amnon
  • Drihem, Lior

Abstract

Methods and systems provide mechanisms for inspection devices, such as firewalls and servers and computers associated therewith, to modify HTTP requests, without requiring the inspection device to terminate the connections at the TCP (Transport Control Protocol) level, as occurs with contemporary web proxies, e.g., web proxy servers—either explicit or implicit proxies.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

73.

Anti-malware detection and removal systems and methods

      
Application Number 15086089
Grant Number 10158665
Status In Force
Filing Date 2016-03-31
First Publication Date 2016-07-28
Grant Date 2018-12-18
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Shaulov, Michael
  • Bobrov, Ohad

Abstract

An anti-malware system including at least one database, remote from a plurality of computers to be protected, which stores identification of computer applications resident on the computers to be protected and an application-specific communications footprint for the computer applications, and at least one server, remote from the plurality of computers to be protected, and being operative to calculate a reference computer-specific communications composite pattern based on multiple application-specific communications footprints for applications installed on the computer to be projected, calculate a current computer-specific communications composite pattern based on actual communications of at least one the plurality of computers to be protected, and provide an alert when the current computer-specific communications composite pattern of the at least one of the plurality of computers to be protected differs from the reference computer-specific communications composite pattern of the at least one of the plurality of computers to be protected.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

74.

Method and system for destroying browser-based memory corruption vulnerabilities

      
Application Number 14595239
Grant Number 09686307
Status In Force
Filing Date 2015-01-13
First Publication Date 2016-07-14
Grant Date 2017-06-20
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Teller, Tomer
  • Hayon, Adi

Abstract

Client-less methods and systems destroy/break the predictive layout of, for example, a client computer memory. The methods and systems operate by injecting a library that manipulates the client computer memory during exploitation attempts.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

75.

Anti-malware detection and removal systems and methods

      
Application Number 15001272
Grant Number 10230758
Status In Force
Filing Date 2016-01-20
First Publication Date 2016-05-19
Grant Date 2019-03-12
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Shaulov, Michael
  • Bobrov, Ohad

Abstract

An anti-malware system including at least one database, remote from a plurality of computers to be protected, which stores identification of computer applications resident on the computers to be protected and an application-specific communications footprint for the computer applications, and at least one server, remote from the plurality of computers to be protected, and being operative to calculate a reference computer-specific communications composite pattern based on multiple application-specific communications footprints for applications installed on the computers to be protected, calculate a current computer-specific communications composite pattern based on actual communications of at least one the plurality of computers to be protected, and provide an alert when the current computer-specific communications composite pattern of the at least one of the plurality of computers to be protected differs from the reference computer-specific communications composite pattern of the at least one of the plurality of computers to be protected.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

76.

Optimization of data locks for improved write lock performance and CPU cache usage in multi core architectures

      
Application Number 14507930
Grant Number 09569265
Status In Force
Filing Date 2014-10-07
First Publication Date 2016-04-07
Grant Date 2017-02-14
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor Chandel, Ajay

Abstract

Data access optimization features the innovative use of a writer-present flag when acquiring read-locks and write-locks. Setting a writer-present flag indicates that a writer desires to modify a particular data. This serves as an indicator to readers and writers waiting to acquire read-locks or write-locks not to acquire a lock, but rather to continue waiting (i.e., spinning) until the write-present flag is cleared. As opposed to conventional techniques in which readers and writers are not locked out until the writer acquires the write-lock, the writer-present flag locks out other readers and writers once a writer begins waiting for a write-lock (that is, sets a writer-present flag). This feature allows a write-lock method to acquire a write-lock without having to contend with waiting readers and writers trying to obtain read-locks and write-locks, such as when using conventional spinlock implementations.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

77.

Duplicate-free item creation using EWS by a single client

      
Application Number 14501085
Grant Number 09935903
Status In Force
Filing Date 2014-09-30
First Publication Date 2016-03-31
Grant Date 2018-04-03
Owner Check Point Software Technologies Ltd (Israel)
Inventor
  • Raban, Yuval
  • Natan, Leo
  • Feldman, Ori

Abstract

Processing client requests for duplicate-free server operations is particularly useful for creating and sending items using Microsoft Exchange Web Services (EWS). The system facilitates avoiding creation and sending of duplicate items. In contrast to conventional implementations that send a single command to create and then perform subsequent processing of an item, a feature of the present embodiment is using two commands: a first command to create the item, and a second command to subsequently process the item. In a specific implementation, an EWS item's provided ChangeKey property is used to keep track of the EWS's reply from the server to the client, thereby avoiding duplicate item creation.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/58 - Message switching systems

78.

Automatic content inspection system for exploit detection

      
Application Number 14836984
Grant Number 09832215
Status In Force
Filing Date 2015-08-27
First Publication Date 2016-01-21
Grant Date 2017-11-28
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Gafni, Aviv
  • Omelchenko, Ben

Abstract

A method of inspecting content intended for a workstation to detect content that performs malicious exploits, including receiving the content for inspection at an inspection server using a processor and memory, loading a virtual machine at the inspection server with an operating system and processes for activating the content, wherein the operating system and processes are similar to those executed at the intended workstation, activating the content in the virtual machine, tracing activity of the virtual machine to form trace data by using features of the processor, wherein upon occurrence of an exception control is transferred to an analyzer that analyzes the trace data based on a context of the exception; and a notification is provided if suspicious activity is detected.

IPC Classes  ?

  • G06F 12/16 - Protection against loss of memory contents
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 1/24 - Testing correct operation

79.

Automatic content inspection system for exploit detection

      
Application Number 14333566
Grant Number 09356945
Status In Force
Filing Date 2014-07-17
First Publication Date 2016-01-21
Grant Date 2016-05-31
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Gafni, Aviv
  • Omelchenko, Ben

Abstract

A method of inspecting content intended for a workstation to detect content that performs malicious exploits, including receiving the content for inspection at an inspection server using a processor and memory, loading a virtual machine at the inspection server with an operating system and processes for activating the content, wherein the operating system and processes are similar to those executed at the intended workstation, activating the content in the virtual machine, tracing activity of the virtual machine to form trace data by using features of the processor, wherein upon occurrence of an exception control is transferred to an analyzer that analyzes the trace data based on a context of the exception; and a notification is provided if suspicious activity is detected.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

80.

Anti-malware detection and removal systems and methods

      
Application Number 14400502
Grant Number 09319427
Status In Force
Filing Date 2013-05-12
First Publication Date 2015-05-07
Grant Date 2016-04-19
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Shaulov, Michael
  • Bobrov, Ohad

Abstract

An anti-malware system including at least one database, remote from a plurality of computers to be protected, which stores identification of computer applications resident on the computers to be protected and an application-specific communications footprint for the computer applications, and at least one server, remote from the plurality of computers to be protected, and being operative to calculate a reference computer-specific communications composite pattern based on multiple application-specific communications footprints for applications installed on the computers to be protected, calculate a current computer-specific communications composite pattern based on actual communications of at least one the plurality of computers to be protected, and provide an alert when the current computer-specific communications composite pattern of the at least one of the plurality of computers to be protected differs from the reference computer-specific communications composite pattern of the at least one of the plurality of computers to be protected.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

81.

Mobile communicator network routing decision system and method

      
Application Number 14055275
Grant Number 09642013
Status In Force
Filing Date 2013-10-16
First Publication Date 2015-04-16
Grant Date 2017-05-02
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Shaulov, Michael
  • Bobrov, Ohad

Abstract

A mobile communicator network routing decision system communicating with each mobile communicator device of a plurality of mobile communicator devices, the plurality of mobile communicator devices communicating with a network via at least one computerized network gateway server, the system including security risk calculation functionality operable for calculating a calculated malware-associated risk associated with each mobile communicator device, and security risk responsive decision functionality, operating in response to the calculated malware-associated risk, for ascertaining whether to allow the communicating of each mobile communicator device with the network via the computerized network gateway server.

IPC Classes  ?

  • G06F 11/00 - Error detectionError correctionMonitoring
  • G06F 12/14 - Protection against unauthorised use of memory
  • H04W 12/12 - Detection or prevention of fraud
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

82.

Method for synchronized BGP and VRRP failover of a network device in a network

      
Application Number 13913537
Grant Number 09537756
Status In Force
Filing Date 2013-06-10
First Publication Date 2014-12-11
Grant Date 2017-01-03
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD (Israel)
Inventor
  • Bahadur, Rahul
  • Nguyen, Tuyen

Abstract

A network device which communicates with peers using Border Gateway Protocol (BGP) advertises to one or more peers a first Multi-Exit Discriminator (MED) when all sessions are in ‘established’ state, and a second MED when one or more sessions are in a non-‘established’ state. The second MED is higher than the first MED and higher than the MED advertised by the backup network device, causing peers to prefer the backup device. If the device is also configured for Virtual Router Redundancy Protocol (VRRP), when the device advertises the first MED, virtual routers are transitioned to ‘master’ state, and when the device advertises the second MED, virtual routers are transitioned to ‘backup’ state.

IPC Classes  ?

  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04L 12/16 - Arrangements for providing special services to substations
  • H04L 12/707 - Route fault prevention or recovery, e.g. rerouting, route redundancy, virtual router redundancy protocol [VRRP] or hot standby router protocol [HSRP] using path redundancy

83.

Method of defending a computer from malware

      
Application Number 13902818
Grant Number 09536090
Status In Force
Filing Date 2013-05-26
First Publication Date 2014-11-27
Grant Date 2017-01-03
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Teller, Tomer
  • Segal, Assaf

Abstract

To defend a computer against malware, first executable code, of the computer, that includes a signature that identifies an address, in the computer's memory, of a respective data structure that is potentially vulnerable to tampering, is identified. The first executable code is copied to provide second executable code that emulates the first executable code using its own respective data structure. The first executable code is modified to jump to the second executable code before accessing the data structure, and also so that the signature identifies the address of a guard page.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

84.

Location-aware rate-limiting method for mitigation of denial-of-service attacks

      
Application Number 13900576
Grant Number 09647985
Status In Force
Filing Date 2013-05-23
First Publication Date 2014-11-27
Grant Date 2017-05-09
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD (Israel)
Inventor
  • Zegman, Tamir
  • Barkai, Ofer

Abstract

A network component has a set of one or more rules, each of which has a match component and an action component. If an incoming packet maps to the match component of a rule, then the packet is handled according to the rule's action component. If the rule also includes a limit component, then if the packet maps to the rule's match component, a family history of the rule is updated, and the packet is handled according to the rule's action component only if the rule's family history satisfies the rule's limit component.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/26 - Monitoring arrangements; Testing arrangements

85.

Simultaneous screening of untrusted digital files

      
Application Number 13769331
Grant Number 09208317
Status In Force
Filing Date 2013-02-17
First Publication Date 2014-08-21
Grant Date 2015-12-08
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Shua, Avi
  • Amar, Hen
  • Basilia, John

Abstract

A plurality of untrusted digital files are run simultaneously in fewer sandboxes than there are files, while monitoring for malicious activity. Preferably, only one sandbox is used. If the monitoring detects malicious activity, either the files are run again in individual sandboxes, or the files are divided among subsets whose files are run simultaneously in one or more sandboxes, while monitoring for malicious activity.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine

86.

SecureAcademy

      
Application Number 012999256
Status Registered
Filing Date 2014-06-16
Registration Date 2014-10-29
Owner Check Point Software Technologies Ltd. (Israel)
NICE Classes  ?
  • 16 - Paper, cardboard and goods made from these materials
  • 41 - Education, entertainment, sporting and cultural services

Goods & Services

Printed matter, courseware, instructional and teaching materials, catalogs, brochures, tutorials, notepads, booklets. Education, training and instructional services.

87.

Natural language processing interface for network security administration

      
Application Number 13706369
Grant Number 08843993
Status In Force
Filing Date 2012-12-06
First Publication Date 2014-06-12
Grant Date 2014-09-23
Owner Check Point Software Technologies Ltd. (Israel)
Inventor
  • Bialik, Uri
  • Ben-Ami, Rami

Abstract

To administer computer network security, a computer system receives a bit string that encodes a natural-language request for adjusting a security policy of the network and parses the bit string to identify one or more objects and an action to be applied to the object(s). Preferably, the system displays a description of one of the objects and a menu of operations that are applicable to the object, receives a user selection of one of the options, and effects the selected operation. The scope of the invention also includes a non-transient computer-readable storage medium bearing code for implementing the method and a system for implementing the method.

IPC Classes  ?

  • G06F 17/28 - Processing or translating of natural language
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

88.

Penalty box for mitigation of denial-of-service attacks

      
Application Number 13682754
Grant Number 08844019
Status In Force
Filing Date 2012-11-21
First Publication Date 2014-05-22
Grant Date 2014-09-23
Owner Check Point Software Technologies Ltd. (Israel)
Inventor
  • Barkai, Ofer
  • Dor, Dorit
  • Zegman, Tamir

Abstract

A security gateway of a computer network receives incoming packets at one or more network interfaces. One or more security functions are applied to the packets. Reports of security function violations are recorded. The reports include the source addresses of the packets, the times that the packets were received, and descriptions of the violations. The descriptions include weights, and if the sum of the weights, for packets of a common source address that are received within a first time interval, exceeds a threshold, subsequent packets from that source address are dropped. Alternatively, in a “monitor only” mode, the common source address is logged but packets are not dropped. Optionally, encrypted packets and/or packets received at some network interfaces but not at other network interfaces are not dropped.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

89.

Filtering of applications for access to an enterprise network

      
Application Number 13902820
Grant Number 09210128
Status In Force
Filing Date 2013-05-26
First Publication Date 2014-05-01
Grant Date 2015-12-08
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Drihem, Lior
  • Perlmutter, Amnon

Abstract

A computer-readable storage medium has embedded thereon non-transient computer-readable code for controlling access to a protected computer network, by intercepting packets that are being exchanged between a computer system and the protected network, and then, for each intercepted packet, identifying the associated application that is running on the computer system, determining whether the application is trusted, for example according to a white list or according to a black list, and disposing of the packet accordingly.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

90.

THREATCLOUD

      
Application Number 012436903
Status Registered
Filing Date 2013-12-17
Registration Date 2014-05-02
Owner Check Point Software Technologies Ltd. (Israel)
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

providing information updates on security threats to computer networks; providing online, non-downloadable software for detecting computer security attacks, computer and email viruses, spam, spyware, adware and malware; providing online, non-downloadable software for protecting computer networks from computer security attacks, computer and email viruses, spam, spyware, adware and malware; providing computer and information technology security services, namely, developing, updating, maintaining and providing online databases of illegitimate sources of electronic communications and sources of computer and email viruses, spam, spyware, adware and malware; providing security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks.

91.

Reducing false positives in data validation using statistical heuristics

      
Application Number 13468045
Grant Number 08959047
Status In Force
Filing Date 2012-05-10
First Publication Date 2013-11-14
Grant Date 2015-02-17
Owner Check Point Software Technologies Ltd. (Israel)
Inventor
  • Perlmutter, Amnon
  • Ganon, Limor
  • Dahan, Meir Jonathan

Abstract

To validate data, a plurality of strings that match a predetermined regular expression is extracted from the data. A validated subset of the strings is identified. To determine whether the validated subset has been falsely validated, it is determined whether the validated subset satisfies each of one or more predetermined criteria relative to the plurality of strings. In one embodiment, the subset is determined to be falsely validated if at least one of the criteria is satisfied. In another embodiment, the subset is determined to be falsely validated if all of the criteria are satisfied. The data are released only if the subset is determined to be falsely validated.

IPC Classes  ?

  • G06N 5/00 - Computing arrangements using knowledge-based models
  • G06F 1/00 - Details not covered by groups and

92.

Predictive synchronization for clustered devices

      
Application Number 13765702
Grant Number 08902900
Status In Force
Filing Date 2013-02-13
First Publication Date 2013-06-20
Grant Date 2014-12-02
Owner Check Point Software Technologies Ltd. (Israel)
Inventor
  • Erman, Amir
  • Perlmutter, Amnon
  • Weissman, Ben Zion

Abstract

A method and system is provided for a scalable clustered system. The method and system may handle asynchronous traffic as well as session backup. In the method and system, a home cluster member having ownership of a local session predicts designation of a an other cluster member to receive a packet associated with the local session and sends appropriate state information or forwarding instruction to the other network member.

IPC Classes  ?

  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04L 12/56 - Packet switching systems
  • H04J 3/06 - Synchronising arrangements

93.

Methods for detecting malicious programs using a multilayered heuristics approach

      
Application Number 13684594
Grant Number 09298921
Status In Force
Filing Date 2012-11-26
First Publication Date 2013-05-09
Grant Date 2016-03-29
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Tsviatkou, Siarhei
  • Rabinin, Siarhei
  • Vavilau, Aliaksei
  • Ryshkevich, Andrei

Abstract

Three heuristic layers are used to determine whether suspicious code received at a port of a data processing device is malware. First, static analysis is applied to the suspicious code. If the suspicious code passes the static analysis, dissembling analysis is applied to the suspicious code. Preferably, if the suspicious code passes the dissembling analysis, dynamic analysis is applied to the suspicious code.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

94.

Detection of account hijacking in a social network

      
Application Number 13110017
Grant Number 08646073
Status In Force
Filing Date 2011-05-18
First Publication Date 2012-11-22
Grant Date 2014-02-04
Owner Check Point Software Technologies Ltd. (Israel)
Inventor Raviv, Gil

Abstract

To protect a user of a social network, the user's activity is monitored during a baseline monitoring period to determine a baseline activity record. If subsequently monitored activity of the user deviates sufficiently from the baseline activity record to indicate abuse (hijacking) of the user's account, the abuse is mitigated, for example by notifying the user of the abuse. Monitored activity includes posting links, updating statuses, sending messages, and changing a profile. Monitoring also includes logging times of the user activity. Monitoring anomalous profile changes does not need a baseline.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/31 - User authentication
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

95.

Network security smart load balancing

      
Application Number 13431989
Grant Number 08726008
Status In Force
Filing Date 2012-03-28
First Publication Date 2012-11-22
Grant Date 2014-05-13
Owner Check Point Software Technologies Ltd. (Israel)
Inventor
  • Schory, Omer
  • Raz, Ofer
  • Gonda, Oded

Abstract

A system and method for protecting data communications in a system including a load-balancer connected to a cluster of security network components, e.g. firewall node. The load-balancer transfers one or more of the data streams respectively to the security components. The security network components transmit control information to the load-balancer and the control information includes an instruction regarding balancing load of the data streams between said components; The load-balancer balances load based on the control information. Preferably, network address translation (NAT) is performed by the load-balancer based on the control information or NAT is performed by the security network component and the control information includes information regarding an expected connection based on NAT. Preferably, when the data communications includes an encrypted session, an encrypted connection of the encrypted session is identified based on the control information and the balancing of the load maintains stickiness of said encrypted connection.

IPC Classes  ?

  • G06F 21/24 - by protecting data directly, e.g. by labelling
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

96.

Methods, circuits, apparatus, systems and associated software applications for providing security on one or more servers, including virtual servers

      
Application Number 13106153
Grant Number 09531754
Status In Force
Filing Date 2011-05-12
First Publication Date 2012-08-23
Grant Date 2016-12-27
Owner CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israel)
Inventor
  • Alon, Zohar
  • Feintuch, Roy

Abstract

Disclosed are methods, circuits, apparatus, systems and associated software applications for providing security on one or more servers, including virtual servers. A server operating system may include or be otherwise functionally associated with a firewall application, which firewall application may regulate IP port access to resources on the server. A port-tending agent or application (PorTender) running on the server, or on a functionally associated computing platform, may monitor and regulate server port status (e.g. opened, closed, and conditionally opened). The PorTender may initiate and engage in communication sessions with a policy server, from which policy server the PorTender may receive port, user and security policies and/or settings.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

97.

Methods for inspecting security certificates by network security devices to detect and prevent the use of invalid certificates

      
Application Number 13411567
Grant Number 08850576
Status In Force
Filing Date 2012-03-04
First Publication Date 2012-06-28
Grant Date 2014-09-30
Owner Check Point Software Technologies Ltd. (Israel)
Inventor
  • Guzner, Guy
  • Haviv, Ami
  • Lieblich, Danny
  • Gal, Yahav

Abstract

Disclosed are methods and media for inspecting security certificates. Methods include the steps of: scanning, by a network security device, messages of a security protocol between a server and a client system; detecting the messages having a security certificate; detecting suspicious security certificates from the messages; and aborting particular sessions of the security protocol associated with the suspicious certificates. Preferably, the step of scanning is performed only on messages of server certificate records. Preferably, the method further includes the step of sending an invalid-certificate notice to the server and the client system. Preferably, the step of detecting the suspicious certificates includes detecting a use of an incorrectly-generated private key for the certificates. Preferably, the step of detecting the suspicious certificates includes detecting an unavailability of revocation information for the certificates. Preferably, the step of detecting the suspicious certificates includes detecting a use of an invalid cryptographic algorithm for the certificates.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

98.

Predictive synchronization for clustered devices

      
Application Number 12876259
Grant Number 08406233
Status In Force
Filing Date 2010-09-07
First Publication Date 2012-03-08
Grant Date 2013-03-26
Owner Check Point Software Technologies Ltd. (Israel)
Inventor
  • Erman, Amir
  • Perlmutter, Amnon
  • Weissman, Ben Zion

Abstract

A method and system is provided for a scalable clustered system. The method and system may handle asynchronous traffic as well as session backup. In the method and system, a home cluster member having ownership of a local session predicts designation of a an other cluster member to receive a packet associated with the local session and sends appropriate state information or forwarding instruction to the other network member.

IPC Classes  ?

  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04L 12/56 - Packet switching systems
  • G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake

99.

Scripting language processing engine in data leak prevention application

      
Application Number 12843056
Grant Number 08776017
Status In Force
Filing Date 2010-07-26
First Publication Date 2012-01-26
Grant Date 2014-07-08
Owner Check Point Software Technologies Ltd (Israel)
Inventor
  • Perlmutter, Amnon
  • Mor, Aviad
  • Gonda, Oded
  • Raz, Ofer
  • Legrow, Matt

Abstract

A data leak prevention application that categorizes documents by data type is provided, a data type being a sensitivity classification of a document based on what data the document contains. A scripting language processing engine is embedded into the data leak prevention application, the scripting language forming part of the application as hard code. A user configures interaction of the scripting language processing engine with the application. The configuring may include modifying or adding code or setting criteria for when code portions of the scripting language processing engine activates. The scripting language processing engine is activated to enhance an accuracy of an existing data type or so as to detect a new data type. Upon enhancing the accuracy of the data type, documents may be re-categorized.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs

100.

Methods for intelligent NIC bonding and load-balancing

      
Application Number 13076481
Grant Number 08644328
Status In Force
Filing Date 2011-03-31
First Publication Date 2011-07-21
Grant Date 2014-02-04
Owner Check Point Software Technologies, Ltd. (Israel)
Inventor
  • Perlmutter, Amnon
  • Waisman, Benzi

Abstract

Methods, devices, and media for intelligent NIC bonding and load-balancing including the steps of: providing a packet at an incoming-packet port of a gateway; attaching an incoming-port identification, associated with the incoming-packet port, to the packet; routing the packet to a processing core; passing the packet through a gateway processing; sending the packet, by the core, to the operating system of a host system; and routing the packet to an outgoing-packet port of the gateway based on the incoming-port identification. Preferably, the gateway processing includes security processing of the packets. Preferably, the step of routing the packet to the outgoing-packet port is based solely on the incoming-port identification. Preferably, an outgoing-port identification, associated with the outgoing-packet port, has an identical bond-index to the incoming-port identification. Preferably, the gateway includes a plurality of incoming-packet ports, a plurality of respective incoming-port identifications, a plurality of processing cores, and a plurality of outgoing-packet ports.

IPC Classes  ?

  1     2        Next Page