Check Point Software Technologies Ltd.

Israël

Retour au propriétaire

1-100 de 152 pour Check Point Software Technologies Ltd. et 3 filiales Trier par
Recheche Texte
Affiner par
Type PI
        Brevet 125
        Marque 27
Juridiction
        États-Unis 132
        Canada 11
        Europe 7
        International 2
Propriétaire / Filiale
[Owner] Check Point Software Technologies Ltd. 132
Check Point Software Technologies, Inc. 18
Liquid Machines, Inc. 1
Pointsec Mobile Technologies, Inc. 1
Date
2026 janvier 1
2026 (AACJ) 1
2025 9
2024 6
2023 8
Voir plus
Classe IPC
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole 58
G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus 19
H04L 9/40 - Protocoles réseaux de sécurité 18
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée 13
G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement 9
Voir plus
Classe NICE
09 - Appareils et instruments scientifiques et électriques 24
42 - Services scientifiques, technologiques et industriels, recherche et conception 11
16 - Papier, carton et produits en ces matières 8
41 - Éducation, divertissements, activités sportives et culturelles 4
38 - Services de télécommunications 1
Voir plus
Statut
En Instance 6
Enregistré / En vigueur 146
  1     2        Prochaine page

1.

FULL DISK ENCRYPTION ANTI-MALWARE SCAN

      
Numéro d'application 18761740
Statut En instance
Date de dépôt 2024-07-02
Date de la première publication 2026-01-08
Propriétaire Check Point Software Technologies, Ltd. (Israël)
Inventeur(s)
  • Gustavsson, Lars Fredrik
  • Zuckerman, Doron
  • Staloverov, Yuri

Abrégé

A computer device, system, and method are provided for leveraging the Full Disk Encryption (FDE) pre-boot environment to conduct anti-malware scans during computer startup, enhancing security by identifying and mitigating malware threats before the main operating system is loaded. To do so, a processor circuitry of the computer device identifies indicators for objects stored in a targeted memory to be scanned. The processor circuitry sends the indicators to a reputation service via a communication interface and receives feedback concerning whether the objects are malicious, suspicious, or benign.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 21/33 - Authentification de l’utilisateur par certificats
  • H04L 12/46 - Interconnexion de réseaux

2.

ANOMALY DETECTION IN MONITORED COMPUTER SYSTEMS

      
Numéro d'application 18621324
Statut En instance
Date de dépôt 2024-03-29
Date de la première publication 2025-10-02
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Ben-Shlomo, Yosef
  • Ben-Dor, Uri
  • Israel, Erez
  • Shohat, Ronen Nisan

Abrégé

A computer device and method are provided for detecting anomalies in a monitored computer system by classifying detected events using a machine learning model trained based on an activity log of events detected during an initial activity period. The machine learning model embeds logged events by generating a vector based on a tokenization of the logged event and a categorization of the logged event by a large language model. Events detected during the initial activity period are used to generate a profile of the monitored computer system. Events detected after the initial activity period are compared to the generated profile by a classifier of the machine learning model to classify each detected event as anomalous or normal.

Classes IPC  ?

  • G06F 11/07 - Réaction à l'apparition d'un défaut, p. ex. tolérance de certains défauts
  • G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p. ex. des interruptions ou des opérations d'entrée–sortie
  • G06F 40/284 - Analyse lexicale, p. ex. segmentation en unités ou cooccurrence

3.

System and method for protecting against wipers by delaying suspicious actions

      
Numéro d'application 18604942
Numéro de brevet 12493697
Statut Délivré - en vigueur
Date de dépôt 2024-03-14
Date de la première publication 2025-09-18
Date d'octroi 2025-12-09
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Orevi, Liran
  • David, Haggai
  • Moshkovich, Ilan
  • Karniushka, Mikita
  • Kavalenka, Pavel

Abrégé

A device and method are provided for protecting against malware attacks affecting a computer system. To do so, system operations are detected and categorized as benign, suspicious, or malicious. Suspicious actions are delayed and placed in a queue instead of being immediately executed. The process initiating the suspicious action is determined and the suspicious action is categorized as benign or malicious based on the initiating process. When the suspicious action is categorized as a benign action, the suspicious action is performed. Conversely, when the suspicious action is categorized as a malicious action, the suspicious process is terminated, and the malicious action is removed from the unperformed actions queue without performing the malicious action.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

4.

Dynamic AI tester with feedback-driven learning

      
Numéro d'application 18901123
Numéro de brevet 12405984
Statut Délivré - en vigueur
Date de dépôt 2024-09-30
Date de la première publication 2025-09-02
Date d'octroi 2025-09-02
Propriétaire Check Point Software Technologies, Ltd. (Israël)
Inventeur(s)
  • Kfir, Barak
  • Bardugo, Nofar
  • Karpati, Dan Eliezer
  • Sidgiyayev, Moisey
  • Root, Elena
  • Ahrak, Yotam

Abrégé

A device, method, and system are provided for improving user interactions with large language models (LLMs) by enhancing user queries. User queries are enhanced by retrieving if/then pairs from a database that are related to the user query. The query is matched to related if statements stored in the database and the then statements of the matched if statements are included with the query to generate improved answers from the LLM.

Classes IPC  ?

  • G06F 16/00 - Recherche d’informationsStructures de bases de données à cet effetStructures de systèmes de fichiers à cet effet
  • G06F 16/3349 - Réutilisation des résultats stockés de requêtes précédentes

5.

DEEP LEARNING BASED BRAND RECOGNITION

      
Numéro d'application 18399942
Statut En instance
Date de dépôt 2023-12-29
Date de la première publication 2025-07-03
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Spira, Yair David
  • Kozhukhov, Vladyslav
  • Livne, Dor

Abrégé

A computer system and method are provided for generating a brand registry and classifying content as real or fake based on the brand registry. The brand registry is formed by generating a representation of brand content by encoding indicators found in brand content as a vector, identifying clusters in the encoded brand content as separate brands, and determining brand indicators for each brand. Unknown content is classified as real or fake brand content by encoding the unknown content, finding as the most similar brand the brand in the brand registry having a cluster centroid closest to the encoded unknown content, and comparing representative indicators for the unknown content to brand indicators for the most similar brand.

Classes IPC  ?

  • G06Q 30/0201 - Modélisation du marchéAnalyse du marchéCollecte de données du marché

6.

Autonomous network policy generator

      
Numéro d'application 18401547
Numéro de brevet 12407734
Statut Délivré - en vigueur
Date de dépôt 2023-12-31
Date de la première publication 2025-07-03
Date d'octroi 2025-09-02
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Israel, Erez
  • Goldman, Lior
  • Katz, Natan

Abrégé

A device, system, and method are provided for generating a network security policy automatically based on network traffic. The network security policy is generated by building a directional graph from the network traffic, with the nodes of the graph representing network end points, and the edges representing communication between two nodes on a communication channel. A feature vector is generated for each of the nodes and a graph neural network is applied to the feature vectors to generate output vectors. The output vectors are clustered using a cost function based on a weighted combination of a distance-based cost function and a network functionality cost function. The clusters generated from the output vectors are used to assign network security rules to each of the clusters.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • H04L 9/40 - Protocoles réseaux de sécurité

7.

AI-DRIVEN PLATFORM FOR API DIALOGUE

      
Numéro d'application 18476480
Statut En instance
Date de dépôt 2023-09-28
Date de la première publication 2025-04-03
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Kfir, Barak
  • Havinson, Albert
  • Bardugo, Nofar
  • Karpati, Dan
  • Zegman, Tamir

Abrégé

A system and method are provided for utilizing a service's Application Programming Interface (API) documentation, generating an OpenAPI specification for the API, enriching the OpenAPI specification with artificial intelligence (AI) generated explanatory notes, and integrating the enriched OpenAPI specification with an AI engine (e.g., a natural language model, large language model, etc.). This process may permit users to interact with the service through natural language.

Classes IPC  ?

8.

Security policy refactoring using AI

      
Numéro d'application 18755973
Numéro de brevet 12483535
Statut Délivré - en vigueur
Date de dépôt 2024-06-27
Date de la première publication 2025-04-03
Date d'octroi 2025-11-25
Propriétaire Check Point Software Technologies Ltd. (Israël)
Inventeur(s)
  • Kfir, Barak
  • Bardugo, Nofar
  • Karpati, Dan
  • Sandler, Eliyahu Hanokh
  • Zegman, Tamir

Abrégé

A computer device (referred to as a processing engine), system, and method are provided for refactoring an original security policy using an artificial intelligence (AI) engine including a large language model (LLM). The processing engine parses policy data converts the original security policy into a code representation and sends the converted code representation to the AI engine. The AI engine analyzes the original security policy by applying the LLM to the code representation and identifies policy insights that are sent to the processing engine.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 40/205 - Analyse syntaxique
  • G06F 40/30 - Analyse sémantique
  • H04L 41/0894 - Gestion de la configuration du réseau basée sur des règles
  • H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle

9.

Network user permission prediction

      
Numéro d'application 18452627
Numéro de brevet 12476977
Statut Délivré - en vigueur
Date de dépôt 2023-08-21
Date de la première publication 2025-02-27
Date d'octroi 2025-11-18
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Shlomo, Yosef Ben
  • Joseph, Ori
  • Israel, Erez
  • Moreinis Adar, Eliya
  • Blumin, Arie

Abrégé

A device and method for employing a machine learning model using processor circuitry to intelligently predict user permissions within a network environment and output a restriction recommendation for modifying user permissions.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06N 5/01 - Techniques de recherche dynamiqueHeuristiquesArbres dynamiquesSéparation et évaluation
  • G06N 20/00 - Apprentissage automatique
  • G06N 20/20 - Techniques d’ensemble en apprentissage automatique

10.

Network device classification

      
Numéro d'application 18345214
Numéro de brevet 12483575
Statut Délivré - en vigueur
Date de dépôt 2023-06-30
Date de la première publication 2025-01-02
Date d'octroi 2025-11-25
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Elhelo, Amit
  • Zinkevich, Dmitry
  • Israel, Erez
  • Cohen-Sason, Daniel
  • Dadush, Ofek
  • Katz, Natan

Abrégé

A device and method for classifying network devices based on their manufacturer (also referred to as vendor or brand) and function (e.g., printer, car, thermostat, etc.). This classification process utilizes a trained model that leverages parameters associated with the device's network activity as input.

Classes IPC  ?

  • H04L 29/00 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes
  • H04L 9/40 - Protocoles réseaux de sécurité

11.

DNS tunneling detection and prevention

      
Numéro d'application 18148183
Numéro de brevet 12411947
Statut Délivré - en vigueur
Date de dépôt 2022-12-29
Date de la première publication 2024-07-04
Date d'octroi 2025-09-09
Propriétaire Check Point Software Technologies Ltd. (Israël)
Inventeur(s)
  • Israel, Erez
  • Karpati, Dan
  • Shterenbaum, Eitan
  • Goldman, Lior

Abrégé

Methods and devices are provided for differentiating between benign DNS data and malicious DNS data included in DNS traffic using an autoencoder. The autoencoder receives input DNS data and is trained to successfully encode the input DNS data when the input DNS data is benign DNS data and to fail to encode the input DNS data when the input DNS data is malicious DNS data. The autoencoder is trained using a modified loss function having a large weight when successfully encoding malicious DNS data.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

12.

Malicious VBA detection using graph representation

      
Numéro d'application 18146092
Numéro de brevet 12314390
Statut Délivré - en vigueur
Date de dépôt 2022-12-23
Date de la première publication 2024-06-27
Date d'octroi 2025-05-27
Propriétaire Check Point Software Technologies Ltd. (Israël)
Inventeur(s)
  • Livne, Dor
  • Duchovni, Avner
  • Israel, Erez
  • Katz, Natan
  • Abramzon, Michael

Abrégé

A method and system are provided for detecting malicious code using graph neural networks. A call graph is created from the computer code by identifying functions in the computer code and vectorizing the identified functions using a stream of application programming interfaces (APIs) called by the functions and using tokens generated for the functions using a byte pair tokenizer. A trained graph neural network (GNN) and a trained attention neural network are applied to the call graph to generate an output graph with each node representing a function and each node assigned weights based on a probability distribution of the maliciousness of the corresponding function. A graph embedding is generated by calculating a weighted sum of the assigned weights and a trained deep neural network is applied to the graph embedding to generate a malicious score for the computer code identifying the computer code as malicious or benign.

Classes IPC  ?

  • H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06N 3/08 - Méthodes d'apprentissage

13.

Phishing detection using HTML

      
Numéro d'application 17936878
Numéro de brevet 12155694
Statut Délivré - en vigueur
Date de dépôt 2022-09-30
Date de la première publication 2024-04-04
Date d'octroi 2024-11-26
Propriétaire Check Point Software Technologies Ltd. (Israël)
Inventeur(s)
  • Katz, Natan
  • Gozlan, Raphael Lior
  • Livne, Dor

Abrégé

A device, system, and method are provided for detecting an email phishing attack by training graph neural network to detect phishing emails based on hypertext markup language (HTML) tags and cascading style sheets (CSS) included in an email. Noise is added during the training of the graph neural network to make the trained graph neural networks more robust against small changes in the training data.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle

14.

Techniques for securing services using inter-service visibility

      
Numéro d'application 17818113
Numéro de brevet 12289330
Statut Délivré - en vigueur
Date de dépôt 2022-08-08
Date de la première publication 2024-02-08
Date d'octroi 2025-04-29
Propriétaire Check Point Software Technologies Ltd. (Israël)
Inventeur(s)
  • Seltzer, Michael
  • Gelman, Aner
  • Gitelman, Shaked

Abrégé

A system and method for securing software as a service (SaaS) platforms by providing inter-service visibility. A method includes identifying, based on log data of a first service, a second service connected to the first service, wherein each of the first service and the second service is a set of functions for performing a respective task, wherein the second service is called by the first service; identifying a plurality of patterns in communications between the first service and the second service in the log data of the first service; creating, based on the identified plurality of patterns, a baseline for communications between the first service and the second service; detecting an anomalous communication between the first service and the second service, wherein the anomalous communication deviates from the baseline; and performing a mitigation action with respect to the detected anomalous communication.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

15.

Network traffic routing in an SD-WAN

      
Numéro d'application 17811609
Numéro de brevet 12316533
Statut Délivré - en vigueur
Date de dépôt 2022-07-11
Date de la première publication 2024-01-11
Date d'octroi 2025-05-27
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Vainshtein, Tal
  • Raz, Ofer

Abrégé

A method and network gateway are provided for routing network traffic between internet service providers (ISPs) based on dynamic communication quality of the ISPs. Dynamic communication quality of the ISPs are monitored and compared by processor circuitry of the network gateway. When a session-based connection is being transmitted on an ISP having dynamic communication quality that does not meet a required communication quality of the connection, the processor circuitry transitions the session-based connection to an ISP meeting the required communication quality of the connection.

Classes IPC  ?

  • G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
  • H04L 45/00 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données
  • H04L 45/12 - Évaluation de la route la plus courte
  • H04L 45/302 - Détermination de la route basée sur la qualité de service [QoS] demandée
  • H04L 45/42 - Routage centralisé

16.

METADATA BASED EFFICIENT PACKET PROCESSING

      
Numéro d'application 17810856
Statut En instance
Date de dépôt 2022-07-06
Date de la première publication 2024-01-11
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s) Markovitz, Oren

Abrégé

A method and device are presented for decreasing processing cycles spent forwarding packets of a communication from receive queues to at least one transmit queue of a network interface controller. When received, packets are placed into a receive queue based on property(ies) of a leading packet. Buffer metadata including transmit information is associated with each communication. Processor circuitry transfers the packets from each of the receive queues to a transmit queue and the buffer metadata is used to determine how to transmit the packet and how to process the packet before transmission.

Classes IPC  ?

  • H04L 47/62 - Ordonnancement des files d’attente caractérisé par des critères d’ordonnancement
  • H04L 47/52 - Ordonnancement selon la bande passante des files d'attente
  • H04L 49/90 - Dispositions de mémoires tampon
  • H04L 49/901 - Dispositions de mémoires tampon en utilisant un descripteur de stockage, p. ex. des pointeurs de lecture ou d'écriture

17.

System and method for protecting against data storage attacks

      
Numéro d'application 17703210
Numéro de brevet 11960606
Statut Délivré - en vigueur
Date de dépôt 2022-03-24
Date de la première publication 2023-10-12
Date d'octroi 2024-04-16
Propriétaire Check Point Software Technologies Ltd. (Israël)
Inventeur(s)
  • Orevi, Liran
  • David, Haggai

Abrégé

A system, method, and device are provided for detecting and mitigating a storage attack at the block level by generating canary blocks by marking blocks of data (referred to as memory blocks) such that other programs do not modify these canary blocks that are monitored to detect data storage attacks that attempt to modify the canary blocks and/or by monitoring statistical and behavioral features of activities over blocks, whether they can be modified by other programs or not. The system and method also backup the memory blocks by backing up memory blocks as they are modified. When a data storage attack is detected, the attack is stopped, and the files are remediated using the backup of the affected memory blocks.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

18.

Automatically mitigating potential service attacks based on learned usage impact patterns

      
Numéro d'application 17685418
Numéro de brevet 12010132
Statut Délivré - en vigueur
Date de dépôt 2022-03-03
Date de la première publication 2023-09-07
Date d'octroi 2024-06-11
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s) Pikarski, Rony

Abrégé

Disclosed herein are systems and methods for automatically mitigating potential network services attacks based on service usage patterns learned using Machine Learning (ML) comprising, collecting operational data indicative of resource utilization of one or more network services serving a plurality of connections and of a plurality of operational factors of the plurality of connections, detecting degradation of the network service(s) based on analysis of the operational data, applying trained ML model(s) to the operational data in order to identify negative operational factor(s) of one or more suspected connections to the network service estimated to induce the degradation where the one or more ML model is trained to predict an impact pattern induced by each of a plurality of operational factors on the resource utilization of the one or more network services, and disconnecting, at least temporarily, the suspected connection(s) from the network service(s).

Classes IPC  ?

19.

CLOUDGUARD

      
Numéro de série 98102058
Statut Enregistrée
Date de dépôt 2023-07-26
Date d'enregistrement 2025-12-30
Propriétaire Check Point Software Technologies Ltd. (Israël)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer hardware in the field of internet and network security; computer hardware with embedded recorded computer software for protecting and securing computer systems and networks; computer hardware for protecting and securing computer systems and networks; downloadable computer software for protecting and securing computer systems and networks; downloadable computer software for inspecting electronic files to detect and prevent computer security attacks, computer and email viruses, spam, spyware, adware and malware Software as a service (SAAS) services featuring software for protecting and securing computer systems and networks; providing online, non-downloadable software for protecting and securing computer systems and networks; computer security services, namely, providing computer and information technology security services through the cloud, for protecting data and information from unauthorized access and for detecting and preventing computer and email viruses, spam, spyware, adware and malware; providing online, non-downloadable software for inspecting electronic files to detect and prevent computer security attacks, computer and email viruses, spam, spyware, adware and malware

20.

Automatically generating security rules for a networked environment based on anomaly detection

      
Numéro d'application 17548673
Numéro de brevet 12238067
Statut Délivré - en vigueur
Date de dépôt 2021-12-13
Date de la première publication 2023-06-15
Date d'octroi 2025-02-25
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s) Pikarski, Rony

Abrégé

A computer implemented method of automatically generating security rules for a networked environment based on anomalies identified using Machine Learning (ML), comprising receiving one or more feature vectors each comprising a plurality of operational parameters of a plurality of objects of a networked environment, identifying one or more anomaly patterns in the networked environment by applying one or more trained ML models to the one or more feature vectors trained to identify patterns deviating from normal behavior of the plurality of objects, parsing each anomaly patterns to a set of behavioral rules by traversing the anomaly pattern through a tree-like decision model, and generating one or more security rules for the networked environment according to the set(s) of behavior rules. Wherein the one or more security rules are applied to increase security of the networked environment.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle

21.

Method for generating, sharing and enforcing network profiles for IoT devices

      
Numéro d'application 18163329
Numéro de brevet 11968223
Statut Délivré - en vigueur
Date de dépôt 2023-02-02
Date de la première publication 2023-06-08
Date d'octroi 2024-04-23
Propriétaire Check Point Software Technologies Ltd. (Israël)
Inventeur(s)
  • Cohen-Sason, Daniel
  • Shamgar, Pini
  • Fabrikant, Yevgeny

Abrégé

A method and system is provided for setting network policies based on electronic devices connected to a network. The electronic devices present on the network are detected and their behavior is captured using profiles. These profiles are then used to generate network policies based on the electronic devices connected to the network. Instead of reacting to behavior of the electronic devices (e.g., anomaly detection to detect malware), the method and system sets the network policies to prevent unauthorized communications (e.g., before malware is present in the system).

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 67/30 - Profils

22.

Unification of data flows over network links with different internet protocol (IP) addresses

      
Numéro d'application 18079036
Numéro de brevet 11777718
Statut Délivré - en vigueur
Date de dépôt 2022-12-12
Date de la première publication 2023-04-06
Date d'octroi 2023-10-03
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Bareket, Amit
  • Gidali, Sagi

Abrégé

Provided herein are systems, devices and methods for opening a connection in a gateway of a cloud based network for a client device connected via two different network links to the gateway and to a Software Defined Perimeter (SDP) controller of a cloud based network. The SDP controller may receive a request from a client device to connect to a gateway of the cloud based network, generate a one-time SPA key for the client device (after authenticated), transmit the SPA key to the gateway, and transmit, via the first network link, the SPA key to the client device. The client device may transmit the SPA key to the gateway via the second network link and the gateway may be configured to open a connection for the client device via the second network link in case the SPA key is valid.

Classes IPC  ?

  • H04L 9/08 - Répartition de clés
  • H04L 69/164 - Adaptation ou utilisations spéciales du protocole UDP
  • H04L 12/66 - Dispositions pour la connexion entre des réseaux ayant différents types de systèmes de commutation, p. ex. passerelles

23.

Scalable and on-demand multi-tenant and multi region secure network

      
Numéro d'application 17982561
Numéro de brevet 11888815
Statut Délivré - en vigueur
Date de dépôt 2022-11-08
Date de la première publication 2023-03-02
Date d'octroi 2024-01-30
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Bareket, Amit
  • Gidali, Sagi

Abrégé

Provided herein are systems and methods for configuring a segmented cloud based network based on separate Internet Protocol (IP) segments, comprising receiving instructions to create one or more additional private virtual networks as respective additional segments in a multi-tenant multi-regional cloud based network segmented to a plurality of segments each mapped by a respective IP address range, calculating one or more non-conflicting new IP address range based on analysis of the IP address range of each of the segments, allocating a respective new IP address range to each additional segment, and deploying automatically one or more gateways. The gateways are configured to connect one or more client devices to the additional segment(s) by assigning each client device an IP address in the respective new IP address range and routing network packets between the client devices and the respective additional segment according to mapping of the respective new IP address range.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 45/02 - Mise à jour ou découverte de topologie
  • H04L 12/66 - Dispositions pour la connexion entre des réseaux ayant différents types de systèmes de commutation, p. ex. passerelles
  • H04L 61/5007 - Adresses de protocole Internet [IP]

24.

CHECK POINT

      
Numéro d'application 018842092
Statut Enregistrée
Date de dépôt 2023-02-28
Date d'enregistrement 2023-09-19
Propriétaire Check Point Software Technologies Ltd. (Israël)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 16 - Papier, carton et produits en ces matières
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Software and / or applications incorporated into computers and / or network systems used in data networks to control network traffic flow, establish trusted links over the network and / or Internet, prevent network attacks (as opposed to physical attacks and / or theft) and to integrate various technologies into a uniform network security policy sold primarily through value added resellers and system integrators, computer and network equipment providers, telecommunications and Internet service providers; excluding software and/or applications incorporated into machines and apparatus for use in currency exchange, cash dispensing and other financial transactions, automatic teller machines and parts and fitting therefor. Printed matter in the form of catalogs, brochures, instructional and technical manuals concerning computer software intended to protect computer systems from unauthorized access via computer networks, but excluding credit cards, debit cards, charge cards, top-up cards and money transfer cards. Design, implementation and maintenance of computer software for Internet service providers and telecommunications companies for managing network infrastructure, traffic management, IP management and for computer software to protect systems from unauthorized access.

25.

On-device protected DNS

      
Numéro d'application 17462418
Numéro de brevet 11489811
Statut Délivré - en vigueur
Date de dépôt 2021-08-31
Date de la première publication 2022-11-01
Date d'octroi 2022-11-01
Propriétaire Check Point Software Technologies Ltd. (Israël)
Inventeur(s)
  • Kfir, Barak
  • Sandler, Eliyahu Hanokh

Abrégé

Methods and systems are provided for protecting DNS traffic locally on an electronic device (e.g., a smart phone) by capturing DNS traffic from network traffic transmitted from the device and ensuring the DNS traffic is routed to a trusted DNS server via a prescribed transmission protocol.

Classes IPC  ?

  • G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
  • H04L 61/5076 - Mécanismes de mise à jour ou de notification, p. ex. DynDNS
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 61/4511 - Répertoires de réseauCorrespondance nom-adresse en utilisant des répertoires normalisésRépertoires de réseauCorrespondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]

26.

Systems and methods for the efficient detection of improperly redacted electronic documents

      
Numéro d'application 17202471
Numéro de brevet 11550934
Statut Délivré - en vigueur
Date de dépôt 2021-03-16
Date de la première publication 2022-09-22
Date d'octroi 2023-01-10
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES, LTD. (Israël)
Inventeur(s) Zegman, Tamir

Abrégé

A method is provided for identifying improperly redacted information in documents. The documents are analyzed to detect redacted areas and text elements and to identify an intersection between a redacted area and a text element. When an area of the intersection is greater than an intersection threshold, the document is identified as containing improperly redacted information.

Classes IPC  ?

  • G06F 21/60 - Protection de données
  • G06F 40/117 - ÉtiquetageAnnotation Désignation de blocChoix des attributs
  • G06T 7/194 - DécoupageDétection de bords impliquant une segmentation premier plan-arrière-plan
  • G06T 7/149 - DécoupageDétection de bords impliquant des modèles déformables, p. ex. des modèles de contours actifs
  • G06V 30/412 - Analyse de mise en page de documents structurés avec des lignes imprimées ou des zones de saisie, p. ex. de formulaires ou de tableaux d’entreprise
  • G06V 30/414 - Extraction de la structure géométrique, p. ex. arborescenceDécoupage en blocs, p. ex. boîtes englobantes pour les éléments graphiques ou textuels

27.

Method for generating, sharing and enforcing network profiles for IoT devices

      
Numéro d'application 17159615
Numéro de brevet 11601459
Statut Délivré - en vigueur
Date de dépôt 2021-01-27
Date de la première publication 2022-07-28
Date d'octroi 2023-03-07
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Cohen-Sason, Daniel
  • Shamgar, Pini
  • Fabrikant, Yevgeny

Abrégé

A method and system is provided for setting network policies based on electronic devices connected to a network. The electronic devices present on the network are detected and their behavior is captured using profiles. These profiles are then used to generate network policies based on the electronic devices connected to the network. Instead of reacting to behavior of the electronic devices (e.g., anomaly detection to detect malware), the method and system sets the network policies to prevent unauthorized communications (e.g., before malware is present in the system).

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 67/30 - Profils

28.

CHECK POINT

      
Numéro d'application 1663325
Statut Enregistrée
Date de dépôt 2022-02-10
Date d'enregistrement 2022-02-10
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 16 - Papier, carton et produits en ces matières
  • 41 - Éducation, divertissements, activités sportives et culturelles
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer hardware and computer software in the field of internet and network security; computer software and hardware with embedded technology designed to protect and secure computer systems and networks; computer software for protecting and securing computer systems and networks; computer software for inspecting electronic files to detect and prevent computer security attacks, phishing, computer and email viruses, spam, spyware, adware and malware. Printed matter; instructional and technical manuals; datasheets; product documentation; training materials; catalogues; brochures. Provision of training; provision of training courses; provision of training programs in the field of cyber security; educational services; arranging of educational conferences; conducting of educational seminars; teaching; arranging and conducting of workshops, tutorials, seminars and conferences; arranging professional workshop and training courses; consultancy relating to arranging and conducting of training workshops; arranging and conducting of workshops and seminars in the field of internet and network security; providing of training and further training; personal development training; vocational training; providing of training and education; providing online training; providing online training seminars; providing online information in the field of training. Software as a service (SAAS) services featuring software for protecting and securing computer systems and networks; providing online, non-downloadable software for protecting and securing computer systems and networks; providing computer and information technology security services through the cloud; providing online, non-downloadable software for inspecting electronic files to detect and prevent computer security attacks, phishing, computer and email viruses, spam, spyware, adware and malware.

29.

Methods and system for packet control and inspection in containers and meshed environments

      
Numéro d'application 17565491
Numéro de brevet 11843614
Statut Délivré - en vigueur
Date de dépôt 2021-12-30
Date de la première publication 2022-04-21
Date d'octroi 2023-12-12
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s) Uriel, Ilan

Abrégé

An instantiated application includes both a runtime instantiation of an application image, and an administrative service operable to install in the instantiated application at least one security module during runtime of the instantiated application in a container. Prior to runtime, a design time agent can access the application image in a repository, examine the application image, and based on the examining, adding at least one security module to the application image prior to instantiation. During runtime, a runtime agent can query parameters of the container, such as static and dynamic variables available on the machine on which the container is running. The runtime agent processes these parameters in conjunction with predefined rules to determine an action such as starting, stopping, adding, and/or changing the security module, such as the method of packet inspection.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 43/028 - Capture des données de surveillance en filtrant
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation

30.

System and method for performing automated security reviews

      
Numéro d'application 17024787
Numéro de brevet 11797685
Statut Délivré - en vigueur
Date de dépôt 2020-09-18
Date de la première publication 2022-03-24
Date d'octroi 2023-10-24
Propriétaire Check Point Software Technologies LTD. (Israël)
Inventeur(s) Uriel, Ilan

Abrégé

An automated method executed by circuitry is provided for monitoring a software platform including multiple pods that manage, deploy, and execute micro services. The method uses monitoring pods at locations of interest in the software platform to label transactions that pass through the monitoring pods. The labels applied to the transactions are sent to a security program for review.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

31.

CHECK POINT

      
Numéro d'application 218800200
Statut Enregistrée
Date de dépôt 2022-02-10
Date d'enregistrement 2025-03-05
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 16 - Papier, carton et produits en ces matières
  • 41 - Éducation, divertissements, activités sportives et culturelles
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

(1) Computer hardware and computer software in the field of internet and network security; computer software and hardware with embedded technology designed to protect and secure computer systems and networks; computer software for protecting and securing computer systems and networks; computer software for inspecting electronic files to detect and prevent computer security attacks, phishing, computer and email viruses, spam, spyware, adware and malware. (2) Printed publications, namely course materials, manuals, precedents and case digests, books, newsletters, brochures, reference guides in the field cybersecurity; instruction materials in the field of cybersecurity; datasheets; product documentation in the field of cybersecurity; training materials in the field of cybersecurity; catalogues; brochures (1) Educational services, namely, development and provision of educational courses in the field of cybersecurity; provision of training programs in the field of cyber security; educational services in the form of seminars, webinars, conferences, and workshops in the field of cybersecurity; teaching programs in the field of cybersecurity; arranging and conducting of workshops, tutorials, seminars and conferences in the field of cybersecurity; arranging professional workshop and training courses in the field of cybersecurity; consultancy relating to arranging and conducting of training workshops in the field of cybersecurity; arranging and conducting of workshops and seminars in the field of internet and network security; arranging of training in the field of cybersecurity; providing of training in the fields of personal development and professional development; providing online training in the field of cybersecurity; providing online training seminars in the field of cybersecurity; providing online information in the field of cybersecurity trainings (2) Software as a service (SAAS) services featuring software for protecting and securing computer systems and networks; providing online, non-downloadable software for protecting and securing computer systems and networks; cloud services in the nature of monitoring of the condition and status of computer systems for security purposes; cloud services in the nature of monitoring of computer systems for detecting unauthorized access or data breach; cloud-based data protection services; cloud-based computer security services for the prevention and resolution of email and web-based cyberattacks; providing online, non-downloadable software for inspecting electronic files to detect and prevent computer security attacks, phishing, computer and email viruses, spam, spyware, adware and malware

32.

Implementing a multi-regional cloud based network using network address translation

      
Numéro d'application 16988658
Numéro de brevet 11271899
Statut Délivré - en vigueur
Date de dépôt 2020-08-09
Date de la première publication 2022-02-10
Date d'octroi 2022-03-08
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Bareket, Amit
  • Gidali, Sagi

Abrégé

Provided herein are systems, devices and methods for applying address translation to network traffic originating from client devices having dynamic Internet Protocol (IP) addresses to support IP based security measures using a gateway configured to connect a plurality of client devices used by a plurality of users to a plurality of cloud based networks. The gateway may receive, from a client device assigned a dynamic IP address, credentials of a user using the respective client device, access a translation record mapping the user, identified by his credentials, to a respective unique static IP address, adjust a source address of each packet received from the client device to include the static IP address, and forward each adjusted packet to a security engine configured to apply security policy(s) to each adjusted packet before transmitting it to the cloud based network(s). The security policy(s) is applied according to the static IP address.

Classes IPC  ?

  • G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
  • H04L 61/2503 - Traduction d'adresses de protocole Internet [IP]
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/66 - Dispositions pour la connexion entre des réseaux ayant différents types de systèmes de commutation, p. ex. passerelles

33.

Unification of data flows over network links with different internet protocol (IP) addresses

      
Numéro d'application 16988662
Numéro de brevet 11558184
Statut Délivré - en vigueur
Date de dépôt 2020-08-09
Date de la première publication 2022-02-10
Date d'octroi 2023-01-17
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Bareket, Amit
  • Gidali, Sagi

Abrégé

Provided herein are systems, devices and methods for opening a connection in a gateway of a cloud based network for a client device connected via two different network links to the gateway and to a Software Defined Perimeter (SDP) controller of a cloud based network. The SDP controller may receive a request from a client device to connect to a gateway of the cloud based network, generate a one-time SPA key for the client device (after authenticated), transmit the SPA key to the gateway, and transmit, via the first network link, the SPA key to the client device. The client device may transmit the SPA key to the gateway via the second network link and the gateway may be configured to open a connection for the client device via the second network link in case the SPA key is valid.

Classes IPC  ?

  • H04L 9/08 - Répartition de clés
  • H04L 69/164 - Adaptation ou utilisations spéciales du protocole UDP
  • H04L 12/66 - Dispositions pour la connexion entre des réseaux ayant différents types de systèmes de commutation, p. ex. passerelles

34.

Scalable and on-demand multi-tenant and multi region secure network

      
Numéro d'application 16988777
Numéro de brevet 11502993
Statut Délivré - en vigueur
Date de dépôt 2020-08-10
Date de la première publication 2022-02-10
Date d'octroi 2022-11-15
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Bareket, Amit
  • Gidali, Sagi

Abrégé

Provided herein are systems and methods for configuring a segmented cloud based network based on separate Internet Protocol (IP) segments, comprising receiving instructions to create one or more additional private virtual networks as respective additional segments in a multi-tenant multi-regional cloud based network segmented to a plurality of segments each mapped by a respective IP address range, calculating one or more non-conflicting new IP address range based on analysis of the IP address range of each of the segments, allocating a respective new IP address range to each additional segment, and deploying automatically one or more gateways. The gateways are configured to connect one or more client devices to the additional segments) by assigning each client device an IP address in the respective new IP address range and routing network packets between the client devices and the respective additional segment according to mapping of the respective new IP address range.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/66 - Dispositions pour la connexion entre des réseaux ayant différents types de systèmes de commutation, p. ex. passerelles
  • H04L 12/715 - Routage hiérarchique, p.ex. réseaux en grappe ou routage inter-domaine
  • H04L 29/12 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes caractérisés par le terminal de données
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 45/02 - Mise à jour ou découverte de topologie
  • H04L 61/5007 - Adresses de protocole Internet [IP]

35.

CHECK POINT

      
Numéro de série 79341340
Statut Enregistrée
Date de dépôt 2022-02-10
Date d'enregistrement 2023-12-05
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 16 - Papier, carton et produits en ces matières
  • 41 - Éducation, divertissements, activités sportives et culturelles
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer hardware for use in the field of internet and network security; Downloadable or recorded computer software for protection, detection, and prevention of threats in the field of Internet and network security; Downloadable or recorded computer software for protecting and securing computer systems and networks; Downloadable or recorded computer software for protecting and securing computer systems and networks; Computer hardware with embedded technology designed to protect and secure computer systems and networks; Downloadable or recorded computer software for inspecting electronic files to detect and prevent computer security attacks, phishing, computer and email viruses, spam, spyware, adware and malware Printed matter, namely, paper signs and manuals in the field of cyber security; Printed matter, namely, instructional and technical manuals in the field of cyber security; Printed matter, namely, datasheets in the field of cyber security; Printed matter, namely, product documentation in the nature of informational product flyers in the field of cyber security; Printed training materials in the field of cyber security; Printed catalogues in the field of cyber security; Printed brochures about cyber security Training services, namely, provision of training in the field of cyber security; Provision of training courses, namely, arranging and conducting of training courses in the field of cyber security; Provision of training programs, namely, arranging and conducting of training programs in the field of cyber security; Educational services, namely, providing classes, seminars, non-downloadable webinars and workshops in the field of cyber security; Arranging of educational conferences in the field of cyber security; Conducting of educational seminars in the field of cyber security; Teaching in the field of cyber security; Arranging and conducting of workshops, tutorials, seminars and conferences in the field of cyber security; Arranging professional workshop and training courses in the field of cyber security; Providing of training and further training in the field of cyber security ; Training services in the field of personal development; Vocational training, namely, vocational education in the field of cyber security; Educational services, namely, providing of training and education classes in the field of cyber security; Providing online training courses, workshops in the field of cyber security; Providing online training seminars in the field of cyber security; Providing online information in the field of cyber security training Software as a service (SAAS) services featuring software for protecting and securing computer systems and networks; providing online, non-downloadable software for protecting and securing computer systems and networks; Computer security services, namely, providing computer and information technology security services through the cloud in the nature of access control, policy management, threat detection, threat prevention, security forensics, machine learning visualization, misconfiguration detection, and enforcement of security best practices and compliance frameworks; providing online, non-downloadable software for inspecting electronic files to detect and prevent computer security attacks, phishing, computer and email viruses, spam, spyware, adware and malware

36.

System and method to detect and prevent Phishing attacks

      
Numéro d'application 17227324
Statut En instance
Date de dépôt 2021-04-11
Date de la première publication 2021-07-29
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Dahan, Meir Jonathan
  • Drihem, Lior
  • Perlmutter, Amnon
  • Tam, Ofir

Abrégé

Detecting and preventing phishing attacks in real-time features protection of users from feeding sensitive data to phishing sites, educating users for theft awareness, and protecting enterprise credentials. A requested document traversing a gateway is embedded with a detection module. When a user accesses the document, the embedded detection module is executed in the context of the document, checks if the document is prompting the user for sensitive information, determining if the document is part of a phishing attack, and initiates mitigation, warning, and/or education techniques.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04W 12/02 - Protection de la confidentialité ou de l'anonymat, p. ex. protection des informations personnellement identifiables [PII]

37.

Methods and system for packet control and inspection in containers and meshed environments

      
Numéro d'application 16503515
Numéro de brevet 11431732
Statut Délivré - en vigueur
Date de dépôt 2019-07-04
Date de la première publication 2021-01-07
Date d'octroi 2022-08-30
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s) Uriel, Ilan

Abrégé

An instantiated application includes both a runtime instantiation of an application image, and an administrative service operable to install in the instantiated application at least one security module during runtime of the instantiated application in a container. Prior to runtime, a design time agent can access the application image in a repository, examine the application image, and based on the examining, adding at least one security module to the application image prior to instantiation. During runtime, a runtime agent can query parameters of the container, such as static and dynamic variables available on the machine on which the container is running. The runtime agent processes these parameters in conjunction with predefined rules to determine an action such as starting, stopping, adding, and/or changing the security module, such as the method of packet inspection.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 43/028 - Capture des données de surveillance en filtrant
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation

38.

Method and system for detecting and classifying malware based on families

      
Numéro d'application 16387642
Numéro de brevet 11321453
Statut Délivré - en vigueur
Date de dépôt 2019-04-18
Date de la première publication 2020-10-22
Date d'octroi 2022-05-03
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Kosarev, Ivan
  • Finkelstein, Lotem

Abrégé

Methods and systems utilizing sandbox outputs for files, such as dynamic file analysis (DFA) reports, regardless of size, to automatically create rules. From these rules, the maliciousness of the file is determined, and if the file is malicious, i.e., malware, the malware is classified into malware families.

Classes IPC  ?

  • G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée
  • G06N 7/02 - Agencements informatiques fondés sur des modèles mathématiques spécifiques utilisant la logique floue
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

39.

Methods and systems for identifying malware enabled by automatically generated domain names

      
Numéro d'application 16896315
Numéro de brevet 11606375
Statut Délivré - en vigueur
Date de dépôt 2020-06-09
Date de la première publication 2020-09-24
Date d'octroi 2023-03-14
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s) Chailytko, Aliaksandr

Abrégé

Computerized methods and systems identify malware enabled by automatically generated domain names. An agent executes a malware, in a controlled environment, at a first temporal input value and a second temporal input value. A first set of domain names is generated in response to the execution at the first temporal input value. A second set of domain names is generated in response to the execution at the second temporal input value. The agent compares the first set of domain names with the second set of domain names to produce a comparison output metric.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/12 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes caractérisés par le terminal de données
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 61/3015 - Enregistrement, génération ou allocation de nom
  • H04L 61/4511 - Répertoires de réseauCorrespondance nom-adresse en utilisant des répertoires normalisésRépertoires de réseauCorrespondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]

40.

Method and system for reducing false positives in web application firewalls

      
Numéro d'application 16288171
Numéro de brevet 11075882
Statut Délivré - en vigueur
Date de dépôt 2019-02-28
Date de la première publication 2020-09-03
Date d'octroi 2021-07-27
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s) Barda, Roy

Abrégé

Computerized methods and systems reduce the false positive rate of Web Application Firewalls (WAFs), by operating automatically and utilizing system defined “trusted sources”.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

41.

Method for performing TLS/SSL inspection based on verified subject name

      
Numéro d'application 16226661
Numéro de brevet 11411924
Statut Délivré - en vigueur
Date de dépôt 2018-12-20
Date de la première publication 2020-06-25
Date d'octroi 2022-08-09
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Isaev, Pavel
  • Sayag, Idan
  • Volodin, Alexey
  • Zegman, Tamir

Abrégé

Methods and systems for processing cryptographically secured connections by a gateway, between a client and a server, are performed. Upon receiving TCP and TLS/SSL handshakes associated with a client side connection, from a client (client computer) to the gateway, a probing connection is established. The probing connection completes the handshakes, and based on the completion of the handshakes, the gateway renders a decision, to bypass, block or inspect, the connections between the client and the server, allowing or not allowing data to pass through the connections between the client and the server.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

42.

Online assets continuous monitoring and protection

      
Numéro d'application 16316574
Numéro de brevet 11960604
Statut Délivré - en vigueur
Date de dépôt 2017-07-09
Date de la première publication 2020-04-23
Date d'octroi 2024-04-16
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s) Priel, Shay

Abrégé

The present invention relates to a method and system for monitoring webpages for detecting malicious contents. According to a preferred embodiment the method comprises A) providing a plurality of URLs provided by a subscriber, employing a crawler to visit a URL webpage of said plurality of URLs; B) retrieving an object from said URL webpage by said crawler; C) analyzing said object retrieved by said crawler from said URL webpage, and determining whether said object retrieved is malicious or not; and D) alerting the subscriber, when said retrieved object is deemed malicious. According to one embodiment, the method further comprises E) employing a crawler to visit a URL webpage of a following URL of the plurality of URLs, when the determination of step C) is deemed not malicious; and F) returning to step B).

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • G06F 16/951 - IndexationTechniques d’exploration du Web
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

43.

Method and system for modeling all operations and executions of an attack and malicious process entry

      
Numéro d'application 16571118
Numéro de brevet 10972488
Statut Délivré - en vigueur
Date de dépôt 2019-09-15
Date de la première publication 2020-03-12
Date d'octroi 2021-04-06
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Pal, Anandabrata
  • Arzi, Lior
  • Leiderfarb, Tamara

Abrégé

Computerized methods and systems determine an entry point or source of an attack on an endpoint, such as a machine, e.g., a computer, node of a network, system or the like. These computerized methods and systems utilize an attack execution/attack or start root, to build an attack tree, which shows the attack on the end point and the damage caused by the attack, as it propagates through the machine, network, system, or the like.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

44.

Method and system for detecting kernel corruption exploits

      
Numéro d'application 16571341
Numéro de brevet 10810309
Statut Délivré - en vigueur
Date de dépôt 2019-09-16
Date de la première publication 2020-01-09
Date d'octroi 2020-10-20
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Frank, Dani
  • Alon, Yoav
  • Gafni, Aviv
  • Omelchenko, Ben

Abrégé

Methods and systems provide for detecting exploitation of kernel vulnerabilities which typically corrupt memory. The methods and systems are implemented, for example, via a host, which includes a hypervisor, which controls the operating system (OS) user space and the OS kernel space.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • G06F 9/48 - Lancement de programmes Commutation de programmes, p. ex. par interruption
  • G06F 21/52 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données

45.

Digital MDR (managed detection and response) analysis

      
Numéro d'application 16489793
Numéro de brevet 11615326
Statut Délivré - en vigueur
Date de dépôt 2018-03-05
Date de la première publication 2020-01-02
Date d'octroi 2023-03-28
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Priel, Shay
  • Ikar, Noam

Abrégé

A method for detecting an occurrence of an online event including retrieving a data item from online sources; forming a list by tagging words and/or strings within the data item according to predefined attributes such that the list includes the words and/or strings with their corresponding attributes; forming sequence items relating to the list according to a predefined criterion such that each sequence item includes at least the list and optionally additional preformed lists that have been formed in the same manner as the list and that have a shared concept with the list according to the predefined criterion; running each of the sequence items in a preformed machine learning classifying model that outputs a determination if there is an occurrence of the online event or not. The present invention further relates to generating the machine learning classifying model. The present invention also relates to a corresponding system.

Classes IPC  ?

  • G06N 5/04 - Modèles d’inférence ou de raisonnement
  • G06N 20/20 - Techniques d’ensemble en apprentissage automatique
  • G06N 20/10 - Apprentissage automatique utilisant des méthodes à noyaux, p. ex. séparateurs à vaste marge [SVM]
  • G06F 16/951 - IndexationTechniques d’exploration du Web
  • G06F 40/279 - Reconnaissance d’entités textuelles
  • G06N 3/04 - Architecture, p. ex. topologie d'interconnexion
  • G06N 7/00 - Agencements informatiques fondés sur des modèles mathématiques spécifiques

46.

On-device network protection

      
Numéro d'application 16012792
Numéro de brevet 10911487
Statut Délivré - en vigueur
Date de dépôt 2018-06-20
Date de la première publication 2019-12-26
Date d'octroi 2021-02-02
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Kfir, Barak
  • Raban, Yuval
  • Berengoltz, Pavel

Abrégé

Methods performed by a system on a computer device, such as a smart phone, i.e., locally, for protecting against network-based attacks. These methods inspect all traffic to every application and web browser on the device.

Classes IPC  ?

  • G06F 12/14 - Protection contre l'utilisation non autorisée de mémoire
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

47.

DOME9

      
Numéro d'application 198623200
Statut Enregistrée
Date de dépôt 2019-09-20
Date d'enregistrement 2024-08-30
Propriétaire Check Point Software Technologies Ltd. (Israël)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

(1) Computer hardware and computer software in the field of internet and network security; computer software and technology embedded in hardware designed to protect and secure computer systems and networks; computer software for protecting and securing computer systems and networks; computer software for inspecting electronic files to detect and prevent computer security attacks, computer and email viruses, spam, spyware, adware and malware (1) Software as a service (SAAS) services featuring software for protecting and securing computer systems and networks; providing online, non-downloadable software for protecting and securing computer systems and networks; cloud-based computer security services for the prevention and resolution of email and webbased cyberattacks; providing online, nondownloadable software for inspecting electronic files to detect and prevent computer security attacks, computer and email viruses, spam, spyware, adware and malware

48.

Anti-malware detection and removal systems and methods

      
Numéro d'application 16292352
Numéro de brevet 10567425
Statut Délivré - en vigueur
Date de dépôt 2019-03-05
Date de la première publication 2019-06-27
Date d'octroi 2020-02-18
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Shaulov, Michael
  • Bobrov, Ohad

Abrégé

An anti-malware system including at least one database, remote from a plurality of computers to be protected, which stores identification of computer applications resident on the computers to be protected and an application-specific communications footprint for the computer applications, and at least one server, remote from the plurality of computers to be protected, and being operative to calculate a reference computer-specific communications composite pattern based on multiple application-specific communications footprints for applications installed on the computers to be protected, calculate a current computer-specific communications composite pattern based on actual communications of at least one the plurality of computers to be protected, and provide an alert when the current computer-specific communications composite pattern of the at least one of the plurality of computers to be protected differs from the reference computer-specific communications composite pattern of the at least one of the plurality of computers to be protected.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

49.

Cloud security assessment system using near-natural language compliance rules

      
Numéro d'application 16194727
Numéro de brevet 10979457
Statut Délivré - en vigueur
Date de dépôt 2018-11-19
Date de la première publication 2019-06-20
Date d'octroi 2021-04-13
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s) Feintuch, Roy

Abrégé

A cloud security assessment (CSA) system configured to identify and remedy a workflow executing in a cloud web service environment is provided. The CSA system includes a network interface configured to connect the CSA system to the cloud web service environment, wherein the cloud web service environment is defined by a cloud account; and a processor in operative communication with the cloud web service environment configured to receive a cloud account compliance rule for the cloud account in a structured near natural language, the compliance rule being applied by the CSA system on at least an instance of the cloud web service environment, wherein is processor is further configured to perform a remediation action based on a policy of the cloud account upon determination of a violation of the compliance rule.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

50.

Method to identify users behind a shared VPN tunnel

      
Numéro d'application 15787781
Numéro de brevet 11323426
Statut Délivré - en vigueur
Date de dépôt 2017-10-19
Date de la première publication 2019-04-25
Date d'octroi 2022-05-03
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Perlmutter, Amnon
  • Drihem, Lior
  • Ziv, Yair
  • Sinai, Jeremy
  • Mizrachi, Tsemach

Abrégé

Transparently identifying users using a shared VPN tunnel uses an innovative method to detect a user of a shared VPN tunnel, after authenticating the user, using an assigned userid (that may be a virtual IP). The virtual IP is used as a cookie in each request made by the user. This cookie is an authentication token used by the gateway to detect the user behind a specific request for an Internet resource (such as an http/s request). The cookie is stripped by the gateway so the cookie is not sent to the resource.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

51.

Method and system for detecting and remediating polymorphic attacks across an enterprise

      
Numéro d'application 16181377
Numéro de brevet 10511616
Statut Délivré - en vigueur
Date de dépôt 2018-11-06
Date de la première publication 2019-03-07
Date d'octroi 2019-12-17
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Leiderfarb, Tamara
  • Arzi, Lior
  • Pal, Anandabrata

Abrégé

Disclosed are methods and systems for detecting malware and potential malware based on using generalized attack trees (generalized attack tree graphs). The generalized attack trees are based on attack trees (attack tree graphs), whose objects, such as links and vertices, have been analyzed, and some of these objects have been generalized, resulting in the generalized attack tree of the invention.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

52.

Methods and systems for identifying malware enabled by automatically generated domain names

      
Numéro d'application 15677084
Numéro de brevet 10728266
Statut Délivré - en vigueur
Date de dépôt 2017-08-15
Date de la première publication 2019-02-21
Date d'octroi 2020-07-28
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s) Chailytko, Aliaksandr

Abrégé

Computerized methods and systems identify malware enabled by automatically generated domain names. An agent executes a malware, in a controlled environment, at a first temporal input value and a second temporal input value. A first set of domain names is generated in response to the execution at the first temporal input value. A second set of domain names is generated in response to the execution at the second temporal input value. The agent compares the first set of domain names with the second set of domain names to produce a comparison output metric.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/12 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes caractérisés par le terminal de données

53.

Account take over prevention

      
Numéro d'application 15470951
Numéro de brevet 10645074
Statut Délivré - en vigueur
Date de dépôt 2017-03-28
Date de la première publication 2018-10-04
Date d'octroi 2020-05-05
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Boxiner, Alon
  • Mizrachi, Liad
  • Vanunu, Oded
  • Zaikin, Roman
  • Daniely, Yoav Shay

Abrégé

A method for monitoring access of users to Internet SaaS applications includes the CISO (company Internet security office) in the configuration and operation of the method, instead of relying only on whatever security the SaaS application implements. Certificates, not accessible to users, are pushed to a user's client. When an access request is received from a client by an application, a gateway requests from the client the certificate. After a notification and approval process with the user, a received certificate is verified, user access to the application is allowed or denied, and the CISO notified of the attempted access.

Classes IPC  ?

  • H04L 29/00 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

54.

Key exchange and mutual authentication in low performance devices

      
Numéro d'application 15473656
Numéro de brevet 10243741
Statut Délivré - en vigueur
Date de dépôt 2017-03-30
Date de la première publication 2018-10-04
Date d'octroi 2019-03-26
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Cohen, Yiftach
  • Geva, Erez

Abrégé

Securely exchanging keys to establish secure connections to low powered connected devices (LPCDs), such as smart devices and IoT (Internet Of Things) devices, and mutual authentication between these devices and third party controllers is accomplished via a higher performance machine configured with a dedicated remote service (DRS). A known symmetric pre-shared key (PSK) is used to establish a secure first connection between the LPCD and the DRS using another symmetric key. The DRS can then use asymmetric key exchange to securely send a new symmetric key to the 3P, and send the same new symmetric key to the LPCD using the secure first connection. This facilitates LPCDs to securely establish secure communications with other devices, in particular for control by third party (3P) devices. This also allows authentication of the LPCD with cloud services, and enables a DRS to vouch for associated devices to other DRSs.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04W 12/06 - Authentification
  • H04W 12/04 - Gestion des clés, p. ex. par architecture d’amorçage générique [GBA]
  • G06F 21/44 - Authentification de programme ou de dispositif

55.

Method and system for detecting kernel corruption exploits

      
Numéro d'application 15473654
Numéro de brevet 10467407
Statut Délivré - en vigueur
Date de dépôt 2017-03-30
Date de la première publication 2018-10-04
Date d'octroi 2019-11-05
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Frank, Dani
  • Alon, Yoav
  • Gafni, Aviv
  • Omelchenko, Ben

Abrégé

Methods and systems provide for detecting exploitation of kernel vulnerabilities which typically corrupt memory. The methods and systems are implemented, for example, via a host, which includes a hypervisor, which controls the operating system (OS) user space and the OS kernel space.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • G06F 9/48 - Lancement de programmes Commutation de programmes, p. ex. par interruption
  • G06F 21/52 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données

56.

Automatic establishment of a VPN connection over unsecure wireless connection

      
Numéro d'application 15415991
Numéro de brevet 10440762
Statut Délivré - en vigueur
Date de dépôt 2017-01-26
Date de la première publication 2018-07-26
Date d'octroi 2019-10-08
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Bareket, Amit
  • Gidali, Sagi

Abrégé

System and method for automatically establishing a Virtual Private Network (VPN) link between a mobile device and a VPN server over an unsecure wireless network, comprising, at the mobile device, detecting an attempt to establish a wireless connection to the internet via an unsecure wireless network, probing the unsecure wireless network to determine accessibility over the unsecure wireless network to a VPN server, automatically initializing, based on the determination, a VPN client, the VPN client executed to establishes a VPN link between the mobile device and the VPN server over the unsecure wireless network, directing network traffic of the mobile device through the VPN link and automatically terminating the VPN client when the mobile device disconnects from the unsecure wireless network.

Classes IPC  ?

  • H04W 76/12 - Établissement de tunnels de transport
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04W 76/30 - Libération de la connexion
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/46 - Interconnexion de réseaux
  • H04W 12/10 - Intégrité
  • H04W 12/00 - Dispositions de sécuritéAuthentificationProtection de la confidentialité ou de l'anonymat
  • H04W 40/24 - Gestion d'informations sur la connectabilité, p. ex. exploration de connectabilité ou mise à jour de connectabilité

57.

Method and system for injecting javascript into a web page

      
Numéro d'application 15272452
Numéro de brevet 10728274
Statut Délivré - en vigueur
Date de dépôt 2016-09-22
Date de la première publication 2018-03-22
Date d'octroi 2020-07-28
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Uriel, Ilan
  • Mor, Aviad

Abrégé

Computerized methods and systems inspect data packets received from a web server for the presence of a value from a list of prohibited values. If a prohibited value is absent, a gateway injects at least one JavaScript code segment for execution by a web browser. The at least one JavaScript code segment includes a plurality of JavaScript functions which include at least one security analysis JavaScript function and a plurality of modified JavaScript functions. Each of the modified JavaScript functions is created from a respective native JavaScript function to include at least one code segment that when executed inspects for at least one of: a dynamic modification of at least one JavaScript function from a prohibited list of JavaScript functions, a dynamic creation of at least one JavaScript function from the prohibited list of JavaScript functions, or a dynamic reference to a value from the list of prohibited values.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

58.

Push based encryption

      
Numéro d'application 15197783
Numéro de brevet 10554629
Statut Délivré - en vigueur
Date de dépôt 2016-06-30
Date de la première publication 2018-01-04
Date d'octroi 2020-02-04
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Raban, Yuval
  • Goshmir, Nadia
  • Reshtik, Shami

Abrégé

A method for introducing a replacement code segment over-the-air through a wireless mobile communication network to an existing code resident on a mobile terminal: identifying the mobile terminal from among terminals served through the wireless mobile communication network; sending a push notification through the network to the mobile terminal, the push notification indicative of the replacement code segment ready for downloading; activating a dynamic update module resident in the mobile terminal, in response to the push notification; sending a request for the replacement code segment; downloading the replacement code segment to the mobile terminal; and transferring the downloaded replacement code segment to the dynamic update module for dynamic replacement of a corresponding old code segment within the mobile terminal with the replacement code segment, obviating a need to recompile the existing code.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 9/16 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes qui sont changés pendant l'opération
  • H04W 12/02 - Protection de la confidentialité ou de l'anonymat, p. ex. protection des informations personnellement identifiables [PII]

59.

Method and system for creating and receiving neutralized data items

      
Numéro d'application 15177352
Numéro de brevet 10382493
Statut Délivré - en vigueur
Date de dépôt 2016-06-09
Date de la première publication 2017-12-14
Date d'octroi 2019-08-13
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Finchelstein, Daniel
  • Perlmutter, Amnon

Abrégé

Computerized methods and systems receive neutralized data items on a first entity from a second entity over a network by receiving a first data item from the second entity. A security protocol that applies rules and policies is applied to the first data item to create a second data item that is a neutralized version of the first data item. The first data item and the second data item are converted into comparable forms. The second data item is analyzed against the first data item by comparing the comparable forms to form at least one comparison measure. The second data item is received on the endpoint if the at least one comparison measure satisfies a threshold criterion. The security protocol is modified to adjust the applied rules and policies if the at least one comparison measure does not satisfy the threshold criterion.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 16/18 - Types de systèmes de fichiers

60.

Method and system for mitigating the effects of ransomware

      
Numéro d'application 15144847
Numéro de brevet 09888032
Statut Délivré - en vigueur
Date de dépôt 2016-05-03
Date de la première publication 2017-11-09
Date d'octroi 2018-02-06
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Dekel, Kasif
  • Mizrachi, Liad
  • Zaikin, Roman
  • Vanunu, Oded

Abrégé

Computerized methods and systems mitigate the effect of a ransomware attack on an endpoint by detecting access events associated with requests by processes, including ransomware processes, to access data items on the endpoint. The data items are hidden from the operating system processes executed on the endpoint. In response to detecting an access event, an action is taken against the process associated with the access event.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/60 - Protection de données

61.

Method and system for destroying browser-based memory corruption vulnerabilities

      
Numéro d'application 15594680
Numéro de brevet 10050995
Statut Délivré - en vigueur
Date de dépôt 2017-05-15
Date de la première publication 2017-08-31
Date d'octroi 2018-08-14
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Teller, Tomer
  • Hayon, Adi

Abrégé

Client-less methods and systems destroy/break the predictive layout of, for example, a client computer memory. The methods and systems operate by injecting a library that manipulates the client computer memory during exploitation attempts.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

62.

Method and system for transparently manipulating downloaded files

      
Numéro d'application 14979569
Numéro de brevet 10567468
Statut Délivré - en vigueur
Date de dépôt 2015-12-28
Date de la première publication 2017-06-29
Date d'octroi 2020-02-18
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Perlmutter, Amnon
  • Drihem, Lior

Abrégé

Methods and systems provide mechanisms for inspection devices, such as firewalls and servers and computers associated therewith, to selectively manipulate files, for which a download has been requested. The manipulation is performed in a manner which is transparent to the requesting user.

Classes IPC  ?

  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

63.

Method and system for detecting and remediating polymorphic attacks across an enterprise

      
Numéro d'application 15373482
Numéro de brevet 10193906
Statut Délivré - en vigueur
Date de dépôt 2016-12-09
Date de la première publication 2017-06-15
Date d'octroi 2019-01-29
Propriétaire CHECKPOINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Leiderfarb, Tamara
  • Arzi, Lior
  • Pal, Anandabrata

Abrégé

Disclosed are methods and systems for detecting malware and potential malware based on using generalized attack trees (generalized attack tree graphs). The generalized attack trees are based on attack trees (attack tree graphs), whose objects, such as links and vertices, have been analyzed, and some of these objects have been generalized, resulting in the generalized attack tree of the invention.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

64.

Method and system for identifying uncorrelated suspicious events during an attack

      
Numéro d'application 15292169
Numéro de brevet 10462160
Statut Délivré - en vigueur
Date de dépôt 2016-10-13
Date de la première publication 2017-06-15
Date d'octroi 2019-10-29
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Arzi, Lior
  • Leiderfarb, Tamara
  • Pal, Anandabrata

Abrégé

Computerized methods and systems identify events associated with an attack initiated on an endpoint client. A listing of processes executed or created on the endpoint during the attack is obtained. The listing of processes includes a first process and at least one subsequent process executed or created by the first process. The computerized methods and systems analyze for the occurrence of at least one event during a time interval associated with the attack. The computerized methods and systems determine whether the listing of processes includes a process that when executed caused the occurrence of the at least one event. If the listing of processes excludes process that when executed caused the occurrence of the at least one event, the at least one event and the causing process are stored, for example, in a database or memory.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

65.

System and method for determining summary events of an attack

      
Numéro d'application 15372423
Numéro de brevet 10291634
Statut Délivré - en vigueur
Date de dépôt 2016-12-08
Date de la première publication 2017-06-15
Date d'octroi 2019-05-14
Propriétaire CHECKPOINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Arzi, Lior
  • Pal, Anandabrata
  • Leiderfarb, Tamara

Abrégé

Computerized methods and systems determine summary events from an attack on an endpoint. The detection and determination of these summary events is performed by a machine, e.g., a computer, node of a network, system or the like.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

66.

Method and system for determining initial execution of an attack

      
Numéro d'application 14963265
Numéro de brevet 10880316
Statut Délivré - en vigueur
Date de dépôt 2015-12-09
Date de la première publication 2017-06-15
Date d'octroi 2020-12-29
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Pal, Anandabrata
  • Leiderfarb, Tamara
  • Arzi, Lior

Abrégé

Computerized methods and systems determine an initial execution of an attack on an endpoint. An indicator of the attack is obtained by analysis of a first process on the endpoint. A sequence of processes that includes the first process associates the initial execution of the attack with the first process. Each respective process in the sequence of processes is created or executed by at least one of the initial execution or a process in the sequence of processes. The initial execution is identified based on linking from the first process to the initial execution through a combination of executions and creations of the processes in the sequence of processes.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 9/448 - Paradigmes d’exécution, p. ex. implémentation de paradigmes de programmation
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 9/445 - Chargement ou démarrage de programme

67.

Method and system for modeling all operations and executions of an attack and malicious process entry

      
Numéro d'application 14963267
Numéro de brevet 10440036
Statut Délivré - en vigueur
Date de dépôt 2015-12-09
Date de la première publication 2017-06-15
Date d'octroi 2019-10-08
Propriétaire CHECKPOINT SOFTWARE TECHNOLOGIES LTD (Israël)
Inventeur(s)
  • Pal, Anandabrata
  • Arzi, Lior
  • Leiderfarb, Tamara

Abrégé

Computerized methods and systems determine an entry point or source of an attack on an endpoint, such as a machine, e.g., a computer, node of a network, system or the like. These computerized methods and systems utilize an attack execution/attack or start root, to build an attack tree, which shows the attack on the end point and the damage caused by the attack, as it propagates through the machine, network, system, or the like.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

68.

On-demand authorization of access to protected resources

      
Numéro d'application 15165670
Numéro de brevet 10616235
Statut Délivré - en vigueur
Date de dépôt 2016-05-26
Date de la première publication 2017-05-25
Date d'octroi 2020-04-07
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Alon, Zohar
  • Feintuch, Roy
  • Fingold, Eyal

Abrégé

A method and system for on-demand authorization of access to protected resources are presented. The method comprises associating a primary user device with at least one secondary user device, the primary device having access privileges at a first degree of privilege; changing any access privileges assigned to the primary user device for accessing protected resources to a lesser degree of privilege; and reinstating the access privileges of the primary user device to the first degree of privilege, upon receiving a verification message from the at least one secondary user device.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

69.

Web injection protection method and system

      
Numéro d'application 14881180
Numéro de brevet 11165820
Statut Délivré - en vigueur
Date de dépôt 2015-10-13
Date de la première publication 2017-04-13
Date d'octroi 2021-11-02
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Vanunu, Oded
  • Mizrachi, Liad

Abrégé

Computerized methods and systems detect unauthorized and potentially malicious, as well as malicious records, typically in the form of electronic forms, such as those where users input information (into input blocks or fields), such as bank and financial institution electronic forms and the like. Should such an unauthorized form, be detected, the detection causes the taking of protective action by the computer whose on whose browser the unauthorized form has been rendered.

Classes IPC  ?

  • G06F 12/14 - Protection contre l'utilisation non autorisée de mémoire
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 16/22 - IndexationStructures de données à cet effetStructures de stockage
  • G06F 21/64 - Protection de l’intégrité des données, p. ex. par sommes de contrôle, certificats ou signatures

70.

Protection of communication on a vehicular network via a remote security service

      
Numéro d'application 14738935
Numéro de brevet 09686294
Statut Délivré - en vigueur
Date de dépôt 2015-06-15
Date de la première publication 2016-12-15
Date d'octroi 2017-06-20
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Kantor, Alon
  • Zegman, Tamir

Abrégé

Methods and systems for protecting components of a linked vehicle from cyber-attack are disclosed. These methods and systems comprise elements of hardware and software for receiving a packet; tunneling the packet to a terrestrial-based security service, analyzing whether the packet is harmful to a component in the vehicle, and at least one action to protect at least one component.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

71.

Detection of potentially malicious web content by emulating user behavior and user environment

      
Numéro d'application 14708248
Numéro de brevet 10567395
Statut Délivré - en vigueur
Date de dépôt 2015-05-10
Date de la première publication 2016-11-10
Date d'octroi 2020-02-18
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Gafni, Aviv
  • Omelchenko, Ben
  • Zegman, Tamir

Abrégé

Methods and systems for the detection of receipt of potentially malicious web content by a web clients are disclosed. These methods and systems comprise elements of hardware and software for obtaining a sandbox environment on a server, wherein the sandbox is configured according to the system characteristics of the client device, emulating web requests and responses of the web client in the sandbox; and analyzing the behavior of components in the sandbox during processing of received web content.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

72.

Method for protection of automotive components in intravehicle communication system

      
Numéro d'application 14673887
Numéro de brevet 09661006
Statut Délivré - en vigueur
Date de dépôt 2015-03-31
Date de la première publication 2016-10-06
Date d'octroi 2017-05-23
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Kantor, Alon
  • Zegman, Tamir

Abrégé

Methods and systems for mitigating cyber attacks on components of an automotive communication system are disclosed. These methods and systems comprise elements of hardware and software for receiving a frame; determining whether the frame potentially affects correct operation of an automotive component; and, taking protective action.

Classes IPC  ?

  • G06F 17/00 - Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • G06F 21/60 - Protection de données
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

73.

Method and system for modifying HTTP request headers without terminating the connection

      
Numéro d'application 14675775
Numéro de brevet 10057390
Statut Délivré - en vigueur
Date de dépôt 2015-04-01
Date de la première publication 2016-10-06
Date d'octroi 2018-08-21
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Perlmutter, Amnon
  • Drihem, Lior

Abrégé

Methods and systems provide mechanisms for inspection devices, such as firewalls and servers and computers associated therewith, to modify HTTP requests, without requiring the inspection device to terminate the connections at the TCP (Transport Control Protocol) level, as occurs with contemporary web proxies, e.g., web proxy servers—either explicit or implicit proxies.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

74.

Anti-malware detection and removal systems and methods

      
Numéro d'application 15086089
Numéro de brevet 10158665
Statut Délivré - en vigueur
Date de dépôt 2016-03-31
Date de la première publication 2016-07-28
Date d'octroi 2018-12-18
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Shaulov, Michael
  • Bobrov, Ohad

Abrégé

An anti-malware system including at least one database, remote from a plurality of computers to be protected, which stores identification of computer applications resident on the computers to be protected and an application-specific communications footprint for the computer applications, and at least one server, remote from the plurality of computers to be protected, and being operative to calculate a reference computer-specific communications composite pattern based on multiple application-specific communications footprints for applications installed on the computer to be projected, calculate a current computer-specific communications composite pattern based on actual communications of at least one the plurality of computers to be protected, and provide an alert when the current computer-specific communications composite pattern of the at least one of the plurality of computers to be protected differs from the reference computer-specific communications composite pattern of the at least one of the plurality of computers to be protected.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

75.

Method and system for destroying browser-based memory corruption vulnerabilities

      
Numéro d'application 14595239
Numéro de brevet 09686307
Statut Délivré - en vigueur
Date de dépôt 2015-01-13
Date de la première publication 2016-07-14
Date d'octroi 2017-06-20
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Teller, Tomer
  • Hayon, Adi

Abrégé

Client-less methods and systems destroy/break the predictive layout of, for example, a client computer memory. The methods and systems operate by injecting a library that manipulates the client computer memory during exploitation attempts.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

76.

Anti-malware detection and removal systems and methods

      
Numéro d'application 15001272
Numéro de brevet 10230758
Statut Délivré - en vigueur
Date de dépôt 2016-01-20
Date de la première publication 2016-05-19
Date d'octroi 2019-03-12
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Shaulov, Michael
  • Bobrov, Ohad

Abrégé

An anti-malware system including at least one database, remote from a plurality of computers to be protected, which stores identification of computer applications resident on the computers to be protected and an application-specific communications footprint for the computer applications, and at least one server, remote from the plurality of computers to be protected, and being operative to calculate a reference computer-specific communications composite pattern based on multiple application-specific communications footprints for applications installed on the computers to be protected, calculate a current computer-specific communications composite pattern based on actual communications of at least one the plurality of computers to be protected, and provide an alert when the current computer-specific communications composite pattern of the at least one of the plurality of computers to be protected differs from the reference computer-specific communications composite pattern of the at least one of the plurality of computers to be protected.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

77.

Optimization of data locks for improved write lock performance and CPU cache usage in multi core architectures

      
Numéro d'application 14507930
Numéro de brevet 09569265
Statut Délivré - en vigueur
Date de dépôt 2014-10-07
Date de la première publication 2016-04-07
Date d'octroi 2017-02-14
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s) Chandel, Ajay

Abrégé

Data access optimization features the innovative use of a writer-present flag when acquiring read-locks and write-locks. Setting a writer-present flag indicates that a writer desires to modify a particular data. This serves as an indicator to readers and writers waiting to acquire read-locks or write-locks not to acquire a lock, but rather to continue waiting (i.e., spinning) until the write-present flag is cleared. As opposed to conventional techniques in which readers and writers are not locked out until the writer acquires the write-lock, the writer-present flag locks out other readers and writers once a writer begins waiting for a write-lock (that is, sets a writer-present flag). This feature allows a write-lock method to acquire a write-lock without having to contend with waiting readers and writers trying to obtain read-locks and write-locks, such as when using conventional spinlock implementations.

Classes IPC  ?

  • G06F 12/00 - Accès à, adressage ou affectation dans des systèmes ou des architectures de mémoires
  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]

78.

Duplicate-free item creation using EWS by a single client

      
Numéro d'application 14501085
Numéro de brevet 09935903
Statut Délivré - en vigueur
Date de dépôt 2014-09-30
Date de la première publication 2016-03-31
Date d'octroi 2018-04-03
Propriétaire Check Point Software Technologies Ltd (Israël)
Inventeur(s)
  • Raban, Yuval
  • Natan, Leo
  • Feldman, Ori

Abrégé

Processing client requests for duplicate-free server operations is particularly useful for creating and sending items using Microsoft Exchange Web Services (EWS). The system facilitates avoiding creation and sending of duplicate items. In contrast to conventional implementations that send a single command to create and then perform subsequent processing of an item, a feature of the present embodiment is using two commands: a first command to create the item, and a second command to subsequently process the item. In a specific implementation, an EWS item's provided ChangeKey property is used to keep track of the EWS's reply from the server to the client, thereby avoiding duplicate item creation.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/58 - Systèmes de commutation de messages

79.

Automatic content inspection system for exploit detection

      
Numéro d'application 14836984
Numéro de brevet 09832215
Statut Délivré - en vigueur
Date de dépôt 2015-08-27
Date de la première publication 2016-01-21
Date d'octroi 2017-11-28
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Gafni, Aviv
  • Omelchenko, Ben

Abrégé

A method of inspecting content intended for a workstation to detect content that performs malicious exploits, including receiving the content for inspection at an inspection server using a processor and memory, loading a virtual machine at the inspection server with an operating system and processes for activating the content, wherein the operating system and processes are similar to those executed at the intended workstation, activating the content in the virtual machine, tracing activity of the virtual machine to form trace data by using features of the processor, wherein upon occurrence of an exception control is transferred to an analyzer that analyzes the trace data based on a context of the exception; and a notification is provided if suspicious activity is detected.

Classes IPC  ?

  • G06F 12/16 - Protection contre la perte de contenus de mémoire
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • H04L 1/24 - Tests pour s'assurer du fonctionnement correct

80.

Automatic content inspection system for exploit detection

      
Numéro d'application 14333566
Numéro de brevet 09356945
Statut Délivré - en vigueur
Date de dépôt 2014-07-17
Date de la première publication 2016-01-21
Date d'octroi 2016-05-31
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Gafni, Aviv
  • Omelchenko, Ben

Abrégé

A method of inspecting content intended for a workstation to detect content that performs malicious exploits, including receiving the content for inspection at an inspection server using a processor and memory, loading a virtual machine at the inspection server with an operating system and processes for activating the content, wherein the operating system and processes are similar to those executed at the intended workstation, activating the content in the virtual machine, tracing activity of the virtual machine to form trace data by using features of the processor, wherein upon occurrence of an exception control is transferred to an analyzer that analyzes the trace data based on a context of the exception; and a notification is provided if suspicious activity is detected.

Classes IPC  ?

  • G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

81.

Anti-malware detection and removal systems and methods

      
Numéro d'application 14400502
Numéro de brevet 09319427
Statut Délivré - en vigueur
Date de dépôt 2013-05-12
Date de la première publication 2015-05-07
Date d'octroi 2016-04-19
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Shaulov, Michael
  • Bobrov, Ohad

Abrégé

An anti-malware system including at least one database, remote from a plurality of computers to be protected, which stores identification of computer applications resident on the computers to be protected and an application-specific communications footprint for the computer applications, and at least one server, remote from the plurality of computers to be protected, and being operative to calculate a reference computer-specific communications composite pattern based on multiple application-specific communications footprints for applications installed on the computers to be protected, calculate a current computer-specific communications composite pattern based on actual communications of at least one the plurality of computers to be protected, and provide an alert when the current computer-specific communications composite pattern of the at least one of the plurality of computers to be protected differs from the reference computer-specific communications composite pattern of the at least one of the plurality of computers to be protected.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

82.

Mobile communicator network routing decision system and method

      
Numéro d'application 14055275
Numéro de brevet 09642013
Statut Délivré - en vigueur
Date de dépôt 2013-10-16
Date de la première publication 2015-04-16
Date d'octroi 2017-05-02
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Shaulov, Michael
  • Bobrov, Ohad

Abrégé

A mobile communicator network routing decision system communicating with each mobile communicator device of a plurality of mobile communicator devices, the plurality of mobile communicator devices communicating with a network via at least one computerized network gateway server, the system including security risk calculation functionality operable for calculating a calculated malware-associated risk associated with each mobile communicator device, and security risk responsive decision functionality, operating in response to the calculated malware-associated risk, for ascertaining whether to allow the communicating of each mobile communicator device with the network via the computerized network gateway server.

Classes IPC  ?

  • G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement
  • G06F 12/14 - Protection contre l'utilisation non autorisée de mémoire
  • H04W 12/12 - Détection ou prévention de fraudes
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

83.

Method for synchronized BGP and VRRP failover of a network device in a network

      
Numéro d'application 13913537
Numéro de brevet 09537756
Statut Délivré - en vigueur
Date de dépôt 2013-06-10
Date de la première publication 2014-12-11
Date d'octroi 2017-01-03
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD (Israël)
Inventeur(s)
  • Bahadur, Rahul
  • Nguyen, Tuyen

Abrégé

A network device which communicates with peers using Border Gateway Protocol (BGP) advertises to one or more peers a first Multi-Exit Discriminator (MED) when all sessions are in ‘established’ state, and a second MED when one or more sessions are in a non-‘established’ state. The second MED is higher than the first MED and higher than the MED advertised by the backup network device, causing peers to prefer the backup device. If the device is also configured for Virtual Router Redundancy Protocol (VRRP), when the device advertises the first MED, virtual routers are transitioned to ‘master’ state, and when the device advertises the second MED, virtual routers are transitioned to ‘backup’ state.

Classes IPC  ?

  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
  • H04L 12/16 - Dispositions pour la fourniture de services particuliers aux abonnés
  • H04L 12/707 - Prévention ou récupération du défaut de routage, p.ex. reroutage, redondance de route "virtual router redundancy protocol" [VRRP] ou "hot standby router protocol" [HSRP] par redondance des chemins d’accès

84.

Method of defending a computer from malware

      
Numéro d'application 13902818
Numéro de brevet 09536090
Statut Délivré - en vigueur
Date de dépôt 2013-05-26
Date de la première publication 2014-11-27
Date d'octroi 2017-01-03
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Teller, Tomer
  • Segal, Assaf

Abrégé

To defend a computer against malware, first executable code, of the computer, that includes a signature that identifies an address, in the computer's memory, of a respective data structure that is potentially vulnerable to tampering, is identified. The first executable code is copied to provide second executable code that emulates the first executable code using its own respective data structure. The first executable code is modified to jump to the second executable code before accessing the data structure, and also so that the signature identifies the address of a guard page.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

85.

Location-aware rate-limiting method for mitigation of denial-of-service attacks

      
Numéro d'application 13900576
Numéro de brevet 09647985
Statut Délivré - en vigueur
Date de dépôt 2013-05-23
Date de la première publication 2014-11-27
Date d'octroi 2017-05-09
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD (Israël)
Inventeur(s)
  • Zegman, Tamir
  • Barkai, Ofer

Abrégé

A network component has a set of one or more rules, each of which has a match component and an action component. If an incoming packet maps to the match component of a rule, then the packet is handled according to the rule's action component. If the rule also includes a limit component, then if the packet maps to the rule's match component, a family history of the rule is updated, and the packet is handled according to the rule's action component only if the rule's family history satisfies the rule's limit component.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

86.

Simultaneous screening of untrusted digital files

      
Numéro d'application 13769331
Numéro de brevet 09208317
Statut Délivré - en vigueur
Date de dépôt 2013-02-17
Date de la première publication 2014-08-21
Date d'octroi 2015-12-08
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Shua, Avi
  • Amar, Hen
  • Basilia, John

Abrégé

A plurality of untrusted digital files are run simultaneously in fewer sandboxes than there are files, while monitoring for malicious activity. Preferably, only one sandbox is used. If the monitoring detects malicious activity, either the files are run again in individual sandboxes, or the files are divided among subsets whose files are run simultaneously in one or more sandboxes, while monitoring for malicious activity.

Classes IPC  ?

  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
  • G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée

87.

SecureAcademy

      
Numéro d'application 012999256
Statut Enregistrée
Date de dépôt 2014-06-16
Date d'enregistrement 2014-10-29
Propriétaire Check Point Software Technologies Ltd. (Israël)
Classes de Nice  ?
  • 16 - Papier, carton et produits en ces matières
  • 41 - Éducation, divertissements, activités sportives et culturelles

Produits et services

Printed matter, courseware, instructional and teaching materials, catalogs, brochures, tutorials, notepads, booklets. Education, training and instructional services.

88.

Natural language processing interface for network security administration

      
Numéro d'application 13706369
Numéro de brevet 08843993
Statut Délivré - en vigueur
Date de dépôt 2012-12-06
Date de la première publication 2014-06-12
Date d'octroi 2014-09-23
Propriétaire Check Point Software Technologies Ltd. (Israël)
Inventeur(s)
  • Bialik, Uri
  • Ben-Ami, Rami

Abrégé

To administer computer network security, a computer system receives a bit string that encodes a natural-language request for adjusting a security policy of the network and parses the bit string to identify one or more objects and an action to be applied to the object(s). Preferably, the system displays a description of one of the objects and a menu of operations that are applicable to the object, receives a user selection of one of the options, and effects the selected operation. The scope of the invention also includes a non-transient computer-readable storage medium bearing code for implementing the method and a system for implementing the method.

Classes IPC  ?

  • G06F 17/28 - Traitement ou traduction du langage naturel
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

89.

Penalty box for mitigation of denial-of-service attacks

      
Numéro d'application 13682754
Numéro de brevet 08844019
Statut Délivré - en vigueur
Date de dépôt 2012-11-21
Date de la première publication 2014-05-22
Date d'octroi 2014-09-23
Propriétaire Check Point Software Technologies Ltd. (Israël)
Inventeur(s)
  • Barkai, Ofer
  • Dor, Dorit
  • Zegman, Tamir

Abrégé

A security gateway of a computer network receives incoming packets at one or more network interfaces. One or more security functions are applied to the packets. Reports of security function violations are recorded. The reports include the source addresses of the packets, the times that the packets were received, and descriptions of the violations. The descriptions include weights, and if the sum of the weights, for packets of a common source address that are received within a first time interval, exceeds a threshold, subsequent packets from that source address are dropped. Alternatively, in a “monitor only” mode, the common source address is logged but packets are not dropped. Optionally, encrypted packets and/or packets received at some network interfaces but not at other network interfaces are not dropped.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

90.

Filtering of applications for access to an enterprise network

      
Numéro d'application 13902820
Numéro de brevet 09210128
Statut Délivré - en vigueur
Date de dépôt 2013-05-26
Date de la première publication 2014-05-01
Date d'octroi 2015-12-08
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Drihem, Lior
  • Perlmutter, Amnon

Abrégé

A computer-readable storage medium has embedded thereon non-transient computer-readable code for controlling access to a protected computer network, by intercepting packets that are being exchanged between a computer system and the protected network, and then, for each intercepted packet, identifying the associated application that is running on the computer system, determining whether the application is trusted, for example according to a white list or according to a black list, and disposing of the packet accordingly.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

91.

THREATCLOUD

      
Numéro d'application 012436903
Statut Enregistrée
Date de dépôt 2013-12-17
Date d'enregistrement 2014-05-02
Propriétaire Check Point Software Technologies Ltd. (Israël)
Classes de Nice  ? 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

providing information updates on security threats to computer networks; providing online, non-downloadable software for detecting computer security attacks, computer and email viruses, spam, spyware, adware and malware; providing online, non-downloadable software for protecting computer networks from computer security attacks, computer and email viruses, spam, spyware, adware and malware; providing computer and information technology security services, namely, developing, updating, maintaining and providing online databases of illegitimate sources of electronic communications and sources of computer and email viruses, spam, spyware, adware and malware; providing security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the Internet, and computer networks.

92.

Reducing false positives in data validation using statistical heuristics

      
Numéro d'application 13468045
Numéro de brevet 08959047
Statut Délivré - en vigueur
Date de dépôt 2012-05-10
Date de la première publication 2013-11-14
Date d'octroi 2015-02-17
Propriétaire Check Point Software Technologies Ltd. (Israël)
Inventeur(s)
  • Perlmutter, Amnon
  • Ganon, Limor
  • Dahan, Meir Jonathan

Abrégé

To validate data, a plurality of strings that match a predetermined regular expression is extracted from the data. A validated subset of the strings is identified. To determine whether the validated subset has been falsely validated, it is determined whether the validated subset satisfies each of one or more predetermined criteria relative to the plurality of strings. In one embodiment, the subset is determined to be falsely validated if at least one of the criteria is satisfied. In another embodiment, the subset is determined to be falsely validated if all of the criteria are satisfied. The data are released only if the subset is determined to be falsely validated.

Classes IPC  ?

  • G06N 5/00 - Agencements informatiques utilisant des modèles fondés sur la connaissance
  • G06F 1/00 - Détails non couverts par les groupes et

93.

Predictive synchronization for clustered devices

      
Numéro d'application 13765702
Numéro de brevet 08902900
Statut Délivré - en vigueur
Date de dépôt 2013-02-13
Date de la première publication 2013-06-20
Date d'octroi 2014-12-02
Propriétaire Check Point Software Technologies Ltd. (Israël)
Inventeur(s)
  • Erman, Amir
  • Perlmutter, Amnon
  • Weissman, Ben Zion

Abrégé

A method and system is provided for a scalable clustered system. The method and system may handle asynchronous traffic as well as session backup. In the method and system, a home cluster member having ownership of a local session predicts designation of a an other cluster member to receive a packet associated with the local session and sends appropriate state information or forwarding instruction to the other network member.

Classes IPC  ?

  • H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
  • H04L 12/56 - Systèmes de commutation par paquets
  • H04J 3/06 - Dispositions de synchronisation

94.

Methods for detecting malicious programs using a multilayered heuristics approach

      
Numéro d'application 13684594
Numéro de brevet 09298921
Statut Délivré - en vigueur
Date de dépôt 2012-11-26
Date de la première publication 2013-05-09
Date d'octroi 2016-03-29
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Tsviatkou, Siarhei
  • Rabinin, Siarhei
  • Vavilau, Aliaksei
  • Ryshkevich, Andrei

Abrégé

Three heuristic layers are used to determine whether suspicious code received at a port of a data processing device is malware. First, static analysis is applied to the suspicious code. If the suspicious code passes the static analysis, dissembling analysis is applied to the suspicious code. Preferably, if the suspicious code passes the dissembling analysis, dynamic analysis is applied to the suspicious code.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

95.

Detection of account hijacking in a social network

      
Numéro d'application 13110017
Numéro de brevet 08646073
Statut Délivré - en vigueur
Date de dépôt 2011-05-18
Date de la première publication 2012-11-22
Date d'octroi 2014-02-04
Propriétaire Check Point Software Technologies Ltd. (Israël)
Inventeur(s) Raviv, Gil

Abrégé

To protect a user of a social network, the user's activity is monitored during a baseline monitoring period to determine a baseline activity record. If subsequently monitored activity of the user deviates sufficiently from the baseline activity record to indicate abuse (hijacking) of the user's account, the abuse is mitigated, for example by notifying the user of the abuse. Monitored activity includes posting links, updating statuses, sending messages, and changing a profile. Monitoring also includes logging times of the user activity. Monitoring anomalous profile changes does not need a baseline.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • G06F 21/31 - Authentification de l’utilisateur
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

96.

ZONEALARM

      
Numéro d'application 159214800
Statut Enregistrée
Date de dépôt 2012-08-30
Date d'enregistrement 2014-02-05
Propriétaire Check Point Software Technologies Inc. (USA)
Classes de Nice  ? 09 - Appareils et instruments scientifiques et électriques

Produits et services

(1) Downloadable computer software for providing security for computers connected to the Internet.

97.

Methods, circuits, apparatus, systems and associated software applications for providing security on one or more servers, including virtual servers

      
Numéro d'application 13106153
Numéro de brevet 09531754
Statut Délivré - en vigueur
Date de dépôt 2011-05-12
Date de la première publication 2012-08-23
Date d'octroi 2016-12-27
Propriétaire CHECK POINT SOFTWARE TECHNOLOGIES LTD. (Israël)
Inventeur(s)
  • Alon, Zohar
  • Feintuch, Roy

Abrégé

Disclosed are methods, circuits, apparatus, systems and associated software applications for providing security on one or more servers, including virtual servers. A server operating system may include or be otherwise functionally associated with a firewall application, which firewall application may regulate IP port access to resources on the server. A port-tending agent or application (PorTender) running on the server, or on a functionally associated computing platform, may monitor and regulate server port status (e.g. opened, closed, and conditionally opened). The PorTender may initiate and engage in communication sessions with a policy server, from which policy server the PorTender may receive port, user and security policies and/or settings.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

98.

Methods for inspecting security certificates by network security devices to detect and prevent the use of invalid certificates

      
Numéro d'application 13411567
Numéro de brevet 08850576
Statut Délivré - en vigueur
Date de dépôt 2012-03-04
Date de la première publication 2012-06-28
Date d'octroi 2014-09-30
Propriétaire Check Point Software Technologies Ltd. (Israël)
Inventeur(s)
  • Guzner, Guy
  • Haviv, Ami
  • Lieblich, Danny
  • Gal, Yahav

Abrégé

Disclosed are methods and media for inspecting security certificates. Methods include the steps of: scanning, by a network security device, messages of a security protocol between a server and a client system; detecting the messages having a security certificate; detecting suspicious security certificates from the messages; and aborting particular sessions of the security protocol associated with the suspicious certificates. Preferably, the step of scanning is performed only on messages of server certificate records. Preferably, the method further includes the step of sending an invalid-certificate notice to the server and the client system. Preferably, the step of detecting the suspicious certificates includes detecting a use of an incorrectly-generated private key for the certificates. Preferably, the step of detecting the suspicious certificates includes detecting an unavailability of revocation information for the certificates. Preferably, the step of detecting the suspicious certificates includes detecting a use of an invalid cryptographic algorithm for the certificates.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

99.

Predictive synchronization for clustered devices

      
Numéro d'application 12876259
Numéro de brevet 08406233
Statut Délivré - en vigueur
Date de dépôt 2010-09-07
Date de la première publication 2012-03-08
Date d'octroi 2013-03-26
Propriétaire Check Point Software Technologies Ltd. (Israël)
Inventeur(s)
  • Erman, Amir
  • Perlmutter, Amnon
  • Weissman, Ben Zion

Abrégé

A method and system is provided for a scalable clustered system. The method and system may handle asynchronous traffic as well as session backup. In the method and system, a home cluster member having ownership of a local session predicts designation of a an other cluster member to receive a packet associated with the local session and sends appropriate state information or forwarding instruction to the other network member.

Classes IPC  ?

  • H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
  • H04L 12/56 - Systèmes de commutation par paquets
  • G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié

100.

Scripting language processing engine in data leak prevention application

      
Numéro d'application 12843056
Numéro de brevet 08776017
Statut Délivré - en vigueur
Date de dépôt 2010-07-26
Date de la première publication 2012-01-26
Date d'octroi 2014-07-08
Propriétaire Check Point Software Technologies Ltd (Israël)
Inventeur(s)
  • Perlmutter, Amnon
  • Mor, Aviad
  • Gonda, Oded
  • Raz, Ofer
  • Legrow, Matt

Abrégé

A data leak prevention application that categorizes documents by data type is provided, a data type being a sensitivity classification of a document based on what data the document contains. A scripting language processing engine is embedded into the data leak prevention application, the scripting language forming part of the application as hard code. A user configures interaction of the scripting language processing engine with the application. The configuring may include modifying or adding code or setting criteria for when code portions of the scripting language processing engine activates. The scripting language processing engine is activated to enhance an accuracy of an existing data type or so as to detect a new data type. Upon enhancing the accuracy of the data type, documents may be re-categorized.

Classes IPC  ?

  • G06F 9/44 - Dispositions pour exécuter des programmes spécifiques
  1     2        Prochaine page