-
公开(公告)号:US10367851B2
公开(公告)日:2019-07-30
申请号:US15824502
申请日:2017-11-28
发明人: Yuval Eldar , Roee Oz
摘要: A method of protecting data items in an organizational computer network, including, defining multiple information profiles for classifying the data item, defining rules for protecting the data item belonging to a specific information profile, classifying the data item according to the defined information profiles, applying a protection method to the data item responsive to the classification and the defined rules, automatically updating the classification of the data item responsive to a change in the content or location of the data item; and automatically transforming the applied protection method, throughout the lifecycle of the data item, responsive to a change in classification or location of the data item, according to the defined rules.
-
公开(公告)号:US10324702B2
公开(公告)日:2019-06-18
申请号:US14847469
申请日:2015-09-08
发明人: Gregory Vishnepolsky , Liran Moysi
摘要: A method and system for modifying network addresses of at least one cloud application. The method comprises receiving a webpage sent to a client device from the at least one cloud application, wherein a webpage designates at least one script loaded to the client device during runtime; injecting a piece of code to the webpage; receiving, by the injected piece of code, an attempt to load each of the at least one script; modifying the at least one script by suffixing each network address designated in the at least one script with a predefined network address; and sending the modified at least one script to the client device, wherein runtime execution of the modified at least one script on the client device causes redirection of future requests from the client device to the cloud application to the suffixed network address.
-
3.
公开(公告)号:US10091169B2
公开(公告)日:2018-10-02
申请号:US14968432
申请日:2015-12-14
发明人: Aviram Cohen , Liran Moysi , Ami Luttwak , Roy Reznik , Greg Vishnepolsky
摘要: A method and system for protecting cloud-based applications executed in a cloud computing platform are presented. The method includes intercepting traffic flows from a plurality of client devices to the cloud computing platform, wherein each of the plurality of client devices is associated with a user attempting to access a cloud-based application; extracting at least one parameter from the intercepted traffic related to at least each client device and a respective user attempting to access the cloud-based application; determining based on, the at least one parameter and at least a set of parameters combining cloud-based application risk factors for a provider of the cloud computing platform, a risk indicator for the user attempting to access the cloud-based application; and performing an action to mitigate a potential risk to the cloud computing platform based on the determined risk indicator.
-
公开(公告)号:US09411892B2
公开(公告)日:2016-08-09
申请号:US14536041
申请日:2014-11-07
发明人: Yiftach Ravid
CPC分类号: G06F17/30707 , G06F17/30011 , G06F17/30648 , G06F17/30705 , G06F17/30864 , G06N99/005
摘要: An electronic document analysis method receiving N electronic documents pertaining to a case encompassing a set of issues including at least one issue and establishing relevance of at least the N documents to at least one individual issue in the set of issues, the method comprising, for at least one individual issue from among the set of issues, receiving an output of a categorization process applied to each document in training and control subsets of the at least N documents, the output including, for each document in the subsets, one of a relevant-to-the-individual issue indication and a non-relevant-to-the-individual issue indication; building a text classifier simulating the categorization process using the output for all documents in the training subset of documents; and running the text classifier on the at least N documents thereby to obtain a ranking of the extent of relevance of each of the at least N documents to the individual issue. The method may also comprise evaluating the text classifier's quality using the output for all documents in the control subset.
-
公开(公告)号:US09881080B2
公开(公告)日:2018-01-30
申请号:US15212092
申请日:2016-07-15
发明人: Yiftach Ravid
CPC分类号: G06F17/30707 , G06F17/30011 , G06F17/30648 , G06F17/30705 , G06F17/30864 , G06N99/005
摘要: An electronic document analysis method receiving N electronic documents pertaining to a case encompassing a set of issues including at least one issue and establishing relevance of at least the N documents to at least one individual issue in the set of issues, the method comprising, for at least one individual issue from among the set of issues, receiving an output of a categorization process applied to each document in training and control subsets of the at least N documents, the output including, for each document in the subsets, one of a relevant-to-the-individual issue indication and a non-relevant-to-the-individual issue indication; building a text classifier simulating the categorization process using the output for all documents in the training subset of documents; and running the text classifier on the at least N documents thereby to obtain a ranking of the extent of relevance of each of the at least N documents to the individual issue. The method may also comprise evaluating the text classifier's quality using the output for all documents in the control subset.
-
公开(公告)号:US09760622B2
公开(公告)日:2017-09-12
申请号:US14633906
申请日:2015-02-27
发明人: Yiftach Ravid
IPC分类号: G06F17/30
CPC分类号: G06F17/30598 , G06F17/30011 , G06F17/3071
摘要: A method for computerized batching of huge populations of electronic documents, including computerized assignment of electronic documents into at least one sequence of electronic document batches such that each document is assigned to a batch in the sequence of batches and such that there is no conflict between batching requirements, the following batching requirements being maintained by a suitably programmed processor: a. pre-defined subsets of documents are always kept together in the same batch, b. batches are equal in size, c. the population is partitioned into clusters, and all documents in any given batch belong to a single cluster rather than to two or more clusters.
-
7.
公开(公告)号:US11245672B2
公开(公告)日:2022-02-08
申请号:US14389527
申请日:2013-06-17
发明人: Yuval Eldar
摘要: A method for accessing content of encrypted data item(s) by a terminal device operating in a digital environment, according to which before the data item is being accessed by the terminal device, it is modified after being intercepted if found to be encrypted. The wrapper of the data item is modified or replaced by embedding a URL with a unique identifier and a message into the wrapper of the data item. If a supported terminal device attempts to accesses the modified data item, the client application natively consumes the data from the modified data item and ignores its wrapper. If not, the message and the URL are displayed on the terminal device and the user browses the URL. Then after authentication, a web server locates the modified data item using the unique identifier, retrieves and decrypts the modified item and converts the decrypted modified data item to a format that can be consumed by the browser. Then, if the user has permission, he can view the data item by rendering it to the browser in his terminal device.
-
公开(公告)号:US10015205B1
公开(公告)日:2018-07-03
申请号:US14804850
申请日:2015-07-21
申请人: Adallom, Ltd.
发明人: Aviram Cohen , Ami Luttwak , Roy Reznik , Gregory Vishnepolsky
CPC分类号: H04L67/02 , H04L67/10 , H04L69/321
摘要: Techniques for reconstructing application-layer traffic flowing between client devices and a cloud computing platform are provided. In an embodiment, the method allows for non-intrusive reconstructing application-layer traffic including requests and responses even in cases including packet drops, re-transmitted packets, and jittered packets. The method includes saving received packets into a zero-copy queue and analyzing the packets saved in the zero-copy memory to identify their respective sessions. Then, each identified session is reconstructed into a session window having a configurable size. In an embodiment, each reconstructed session includes application-layer requests and responses; The method further includes for, each identified session, matching each application-layer request to a corresponding application-layer response based on a matching identifier and time-interval threshold.
-
公开(公告)号:US10002182B2
公开(公告)日:2018-06-19
申请号:US14161221
申请日:2014-01-22
发明人: Yiftach Ravid
IPC分类号: G06F17/30
CPC分类号: G06F16/288 , G06F16/285 , G06F16/335
摘要: System and method for computerized identification and presentation of semantic themes occurring in a set of electronic documents, comprising performing topic modeling on the set of documents thereby to yield a set of topics and for each topic, a topic-modeling output list of words; and using a processor performing a matching algorithm to match only a subset of each topic-modeling output list of words, to the output list's corresponding topic, such that each word appears in no more than a predetermined number of subsets from among said subsets.
-
公开(公告)号:US09729538B2
公开(公告)日:2017-08-08
申请号:US14474198
申请日:2014-09-01
发明人: Idan Plotnik , Tal Arieh Be'ery , Michael Dolinsky , Ohad Plotnik , Gregory Messerman , Sivan Krigsman
CPC分类号: H04L63/0807 , G06F21/335 , H04L63/14 , H04L63/1416
摘要: A method, system and computer program for recoupling Kerberos Authentication and Authorization requests, the method including the steps of: (a) extracting authorization information, including a copy of a Ticket Granting Ticket (TGT), from an authorization request; (b) retrieving authentication information including the TGT, the authentication information having been previously extracted from an authentication transaction and stored; (c) cross-referencing the extracted authorization information with the retrieved authentication information, such that a discrepancy between the cross-referenced information invokes a security event alert.
-
-
-
-
-
-
-
-
-